Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 1 Apr 2003 11:03:05 -0800
From:      "Sam Leffler" <sam@errno.com>
To:        "Mailing List FreeBSD Network" <freebsd-net@freebsd.org>, "Eric Masson" <e-masson@kisoft-services.com>
Subject:   Re: options FAST_IPSEC & tunnels
Message-ID:  <05b901c2f881$67e907f0$52557f42@errno.com>
References:  <86pto6mbxj.fsf@notbsdems.interne.kisoft-services.com>

next in thread | previous in thread | raw e-mail | index | archive | help
> I'm using IPSEC tunnels to join different gateways over the Internet.
>
> I've made some trials with FAST_IPSEC today (I've received a Soekris
> VPN1201) and i'm facing a problem with incoming packets.
>
> The following code snippet from /sys/netinet/ip_input.c permits
> detunneled packets to flow without being filtered by ipf/ipfw :
>
> #if defined(IPSEC) && !defined(IPSEC_FILTERGIF)
> /*
> * Bypass packet filtering for packets from a tunnel (gif).
> */
> if (ipsec_gethist(m, NULL))
> goto pass;
> #endif
>
> Is there any counterpart for FAST_IPSEC (I've dug thru the code, but no
> luck atm) ?

Wow, someone besides me actually using fast ipsec! :)

Packets are tagged once they've been processed on input.  I think you can do
a similar check with something like:

if (m_tag_find(PACKET_TAG_IPSEC_IN_DONE) != NULL)
    goto pass;

Long term, I intend is to associate packets with an enc device so there's a
way to identify these packets when writing firewall rules.

    Sam



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?05b901c2f881$67e907f0$52557f42>