From owner-freebsd-bugs@FreeBSD.ORG Thu Sep 29 21:50:11 2011 Return-Path: Delivered-To: freebsd-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 617B11065676 for ; Thu, 29 Sep 2011 21:50:11 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 1EDA88FC15 for ; Thu, 29 Sep 2011 21:50:11 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.4/8.14.4) with ESMTP id p8TLoAFb063315 for ; Thu, 29 Sep 2011 21:50:10 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.4/8.14.4/Submit) id p8TLoAAV063314; Thu, 29 Sep 2011 21:50:10 GMT (envelope-from gnats) Date: Thu, 29 Sep 2011 21:50:10 GMT Message-Id: <201109292150.p8TLoAAV063314@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org From: Matthew Grant Cc: Subject: Re: kern/161058: enc0 not capturing outgoing IPSEC encrypted transport IPv6 traffic from host X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Matthew Grant List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Sep 2011 21:50:11 -0000 The following reply was made to PR kern/161058; it has been noted by GNATS. From: Matthew Grant To: bug-followup@FreeBSD.org, matthew.grant@net24.co.nz Cc: Subject: Re: kern/161058: enc0 not capturing outgoing IPSEC encrypted transport IPv6 traffic from host Date: Fri, 30 Sep 2011 10:29:25 +1300 Hi! Bug stops outing stateful connection tracking over IPSEC to happen as per IPv4 (IPFW): IPv6 outgoing traffic is only matched as esp, and the packet does not appear as per IPv4 as a TCP SYN outgoing on enc0. IPv4: cmd="ipfw add" pif="em0" p6if="gif0" $cmd 00100 allow udp from 203.79.116.183 500 to me 500 in via $pif $cmd 00101 allow udp from me 500 to 203.79.116.183 500 out via $pif $cmd 00120 allow esp from me to 203.79.116.183 out via $pif $cmd 00121 allow esp from 203.79.116.183 to me in via $pif $cmd 00190 check-state ipsec $cmd 00200 allow udp from 203.79.116.183 to me 53 in ipsec via $pif keep-state $cmd 00210 allow tcp from 203.79.116.183 to me 53 in ipsec via $pif keep-state $cmd 00220 allow ip4 from me to 203.79.116.183 out keep-state $cmd 00290 deny log ip from 203.79.116.183 to me in via $pif $cmd 00291 deny log ip from me to 203.79.116.183 out via $pif IPv4: $cmd 10100 allow udp from 2001:470:f012:2::2 500 to me6 500 in via $p6if $cmd 10101 allow udp from me6 500 to 2001:470:f012:2::2 500 out via $p6if $cmd 10120 allow esp from me6 to 2001:470:f012:2::2 out via $p6if $cmd 10121 allow esp from 2001:470:f012:2::2 to me6 in via $p6if $cmd 10180 check-state $cmd 10200 allow udp from 2001:470:f012:2::2 to me6 53 in ipsec via $p6if keep-state $cmd 10210 allow tcp from 2001:470:f012:2::2 to me6 53 in ipsec via $p6if keep-state $cmd 10220 allow ip6 from me6 to 2001:470:f012:2::2 out keep-state $cmd 10290 deny log ip from 2001:470:f012:2::2 to me6 in via $p6if $cmd 10291 deny log ip from me6 to 2001:470:f012:2::2 out via $p6if # Internet name server access $cmd 10300 allow udp from any to me6 53 in via $p6if $cmd 10301 allow udp from me6 53 to any out via $p6if $cmd 10302 allow tcp from any to me6 53 in via $p6if $cmd 10303 allow tcp from me6 53 to any out via $p6if