From owner-freebsd-amd64@freebsd.org Wed Feb 10 20:00:00 2016 Return-Path: Delivered-To: freebsd-amd64@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 952CAAA305B for ; Wed, 10 Feb 2016 20:00:00 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 6CE3B251 for ; Wed, 10 Feb 2016 20:00:00 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id u1AJxxfg082028 for ; Wed, 10 Feb 2016 20:00:00 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-amd64@FreeBSD.org Subject: [Bug 207087] kernel: r295285 in 10.2-STABLE breaks OpenVPN functionality Date: Wed, 10 Feb 2016 19:59:59 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 10.2-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: mgrooms@shrew.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Mailman-Approved-At: Wed, 10 Feb 2016 20:51:23 +0000 X-BeenThere: freebsd-amd64@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Porting FreeBSD to the AMD64 platform List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 10 Feb 2016 20:00:00 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D207087 mgrooms@shrew.net changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |mgrooms@shrew.net --- Comment #3 from mgrooms@shrew.net --- Recently I noticed that after upgrading two separate pairs of firewalls to 10.2-RELEASE that my ISAKMP deamons stopped negotiating SAs with peers. I j= ust haven't gotten around to submitting a bug report yet. It only seems to happ= en when large UDP packets get fragmented due to large payloads ( ie. certifica= te info is transmitted during late in phase1 negotiation ). This may be unique= to the bge driver or related hardware as the isakmp daemon started working aga= in on both sets of firewalls once I disabled hardware checksum offload ( ifcon= fig bgeX -rxcsum ). This work-around wasn't required until the upgrade to 10.2-RELEASE, but I can't say if it was at a specific patch level. I can say that one set of firewalls were upgraded from 9.2-RELEASE-p?? and the other = set were upgraded from a patched 10.0-RELEASE, so I assume the commit that broke UDP re-assembly was committed sometime between 10.0-RELEASE and 10.2-RELEASE-p11. Sorry I can't be more specific. BTW, this isn't an attempt to hijack your problem report. I just thought th= at the issue you describe ( openvpn w/ UDP ) may be related to mine so I thoug= ht it would be worth mentioning. Have you tried disabling hw checksum offload = on your public facing network device? If that improves the situation, it's qui= te possible that we are being bit by the same issue. --=20 You are receiving this mail because: You are on the CC list for the bug.=