Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 02 Aug 2001 22:35:58 +0900
From:      itojun@iijlab.net
To:        "Chris" <mlnn4@oaks.com.au>
Cc:        "freebsd-net@freebsd.org" <freebsd-net@freebsd.org>
Subject:   Re: kernel upgrade causes truncated IPSEC packets 
Message-ID:  <16101.996759358@itojun.org>
In-Reply-To: mlnn4's message of Thu, 02 Aug 2001 22:36:06 %2B1000. <200108021237.f72CbKQ00596@aussie.org> 

next in thread | previous in thread | raw e-mail | index | archive | help

>>packet. But the PPP process only sees the first 36 bytes or so of it (for
>>example, a packet which arrives as 263 bytes becomes 320 bytes after
>>encapsulation. This is what is shown by both tcpdump and the packet header,
>>as read from the ppp async stream), but only 36 bytes of it make it through
>>to the modem (plus the PPP overhead of about 5 bytes).
>
>I re-posted this to -stable, and thanks to Bill Fenner it is now fixed.
>
>It seems that the IPSEC code for some reason will sometimes insert a zero-
>length mbuf into the mbuf chain. if_tun.c will cease following the linked
>list of mbufs if it sees a zero-length one, thus causing the truncated output 
>packets. Dunno how long it's been like that (probably 7 weeks) but it would
>have affected anyone who used IPSEC over a /dev/tunN device.

	was the fix committed to sys/net/if_tun.c?  i guess other *BSDs have
	the same issue.

itojun

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?16101.996759358>