From owner-freebsd-bugs@FreeBSD.ORG Sat Nov 30 10:00:01 2013 Return-Path: Delivered-To: freebsd-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 0DE87BA9 for ; Sat, 30 Nov 2013 10:00:01 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id C2F2116CD for ; Sat, 30 Nov 2013 10:00:00 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id rAUA00MD046007 for ; Sat, 30 Nov 2013 10:00:00 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id rAUA00wg046006; Sat, 30 Nov 2013 10:00:00 GMT (envelope-from gnats) Resent-Date: Sat, 30 Nov 2013 10:00:00 GMT Resent-Message-Id: <201311301000.rAUA00wg046006@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Monkey Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 914028B9 for ; Sat, 30 Nov 2013 09:55:56 +0000 (UTC) Received: from papadum.monkeybrains.net (papadum.monkeybrains.net [208.69.40.192]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 7BFC416AE for ; Sat, 30 Nov 2013 09:55:56 +0000 (UTC) Received: from papadum.monkeybrains.net (localhost [127.0.0.1]) by papadum.monkeybrains.net (8.14.7/8.14.7) with ESMTP id rAU9UFYW067789 for ; Sat, 30 Nov 2013 01:30:15 -0800 (PST) (envelope-from monkey@papadum.monkeybrains.net) Received: (from root@localhost) by papadum.monkeybrains.net (8.14.7/8.14.7/Submit) id rAU9UAHT067788; Sat, 30 Nov 2013 01:30:10 -0800 (PST) (envelope-from monkey) Message-Id: <201311300930.rAU9UAHT067788@papadum.monkeybrains.net> Date: Sat, 30 Nov 2013 01:30:10 -0800 (PST) From: Monkey To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.114 Subject: kern/184389: libalias fails to adjust MTU from jails X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.16 Precedence: list Reply-To: Monkey List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 30 Nov 2013 10:00:01 -0000 >Number: 184389 >Category: kern >Synopsis: libalias fails to adjust MTU from jails >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Sat Nov 30 10:00:00 UTC 2013 >Closed-Date: >Last-Modified: >Originator: Monkey >Release: FreeBSD 9.2-RELEASE-p2 amd64 >Organization: MonkeyBrains.net >Environment: System: FreeBSD papadum 9.2-RELEASE-p2 FreeBSD 9.2-RELEASE-p2 #0: Sat Nov 30 00:46:30 PST 2013 monkey@papadum:/usr/obj/usr/src/sys/GENERIC amd64 ipfw_nat, libalias >Description: MTU size is not properly discovered from packets generated from jails. libalias and/or ipfw_nat need to communicate with the network stack to determine MTU. >How-To-Repeat: Set up ipfw_nat to nat packets generated from a jail. Send those packets to a second FreeBSD box that has a GRE tunnel to third machine. Attempt to ssh or scp a file larger than 1500 bytes from the jail to the third machine -- it hangs. If you SSH from the host (outside of the jail), the ssh connects. If you quickly log into the jail, it will briefly work (OS remembers MTU size for that path). >Fix: Set the MTU to 1476 on the interface connecting computer A to computer B. >Release-Note: >Audit-Trail: >Unformatted: