Date: Tue, 21 Oct 2014 11:35:15 -0500 From: Matthew Grooms <mgrooms@shrew.net> To: freebsd-net@freebsd.org Subject: Re: Broken IPsec + enc +pf/ipfw Message-ID: <54468B43.40602@shrew.net> In-Reply-To: <20141021160643.GB2787@1970jan1-epo.ch> References: <544535C2.9020301@shrew.net> <544566D2.40303@FreeBSD.org> <544569CF.2060905@shrew.net> <54457599.4060102@yandex.ru> <54458001.6000507@shrew.net> <544611F8.9070403@yandex.ru> <20141021160643.GB2787@1970jan1-epo.ch>
next in thread | previous in thread | raw e-mail | index | archive | help
On 10/21/2014 11:06 AM, Kyle Williams wrote: > Hello, > > I'm currently using 10.0, IPSEC, racoon, enc, and pf between two remote > hosts without NATT. The gif tunnel is ipv4 only, host A is ipv4 only, > host B is ipv4/ipv6. I use IPSEC to route traffic between jails on both > hosts, with the jails using cloned lo1 and 10.0.0.0/8 addresses. > > I'm testing the posted patches on host A with the following pf.conf: > block all > pass all > > I'm using the recommended sysctl's: > net.enc.in.ipsec_bpf_mask=2 > net.enc.in.ipsec_filter_mask=2 > net.enc.out.ipsec_bpf_mask=1 > net.enc.out.ipsec_filter_mask=1 > [...] > > I'm willing to test more kernel patches, but I can't install head. > Hey Kyle, Thanks for lending a hand. I tested a few myself last night but had no luck. This morning I received an email off list that pointed to a patch that was merged to 10 stable. It sounds promising ... Log: Merge r263091: fix mbuf flags clash that lead to failure of operation of IPSEC and packet filters. https://lists.freebsd.org/pipermail/svn-src-stable-10/2014-March/001111.html I won't have a chance to try it until after business hours tonight, but will report back to the list with my results. Alternately, I assume you also could upgrade to 10.1-RC2 as the MFC for this patch happened back in March. I may go this route myself and then bump up to RELEASE in a few weeks when it happens. Thanks, -Matthew
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54468B43.40602>