Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 10 Feb 2016 19:59:59 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-net@FreeBSD.org
Subject:   [Bug 207087] kernel: r295285 in 10.2-STABLE breaks OpenVPN functionality
Message-ID:  <bug-207087-2472-E8gxxbhhHP@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-207087-2472@https.bugs.freebsd.org/bugzilla/>
References:  <bug-207087-2472@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D207087

mgrooms@shrew.net changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |mgrooms@shrew.net

--- Comment #3 from mgrooms@shrew.net ---
Recently I noticed that after upgrading two separate pairs of firewalls to
10.2-RELEASE that my ISAKMP deamons stopped negotiating SAs with peers. I j=
ust
haven't gotten around to submitting a bug report yet. It only seems to happ=
en
when large UDP packets get fragmented due to large payloads ( ie. certifica=
te
info is transmitted during late in phase1 negotiation ). This may be unique=
 to
the bge driver or related hardware as the isakmp daemon started working aga=
in
on both sets of firewalls once I disabled hardware checksum offload ( ifcon=
fig
bgeX -rxcsum ). This work-around wasn't required until the upgrade to
10.2-RELEASE, but I can't say if it was at a specific patch level. I can say
that one set of firewalls were upgraded from 9.2-RELEASE-p?? and the other =
set
were upgraded from a patched 10.0-RELEASE, so I assume the commit that broke
UDP re-assembly was committed sometime between 10.0-RELEASE and
10.2-RELEASE-p11. Sorry I can't be more specific.

BTW, this isn't an attempt to hijack your problem report. I just thought th=
at
the issue you describe ( openvpn w/ UDP ) may be related to mine so I thoug=
ht
it would be worth mentioning. Have you tried disabling hw checksum offload =
on
your public facing network device? If that improves the situation, it's qui=
te
possible that we are being bit by the same issue.

--=20
You are receiving this mail because:
You are on the CC list for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-207087-2472-E8gxxbhhHP>