Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 04 Aug 2001 05:38:50 +0900
From:      itojun@iijlab.net
To:        Bill Fenner <fenner@research.att.com>
Cc:        mlnn4@oaks.com.au, freebsd-net@freebsd.org
Subject:   Re: kernel upgrade causes truncated IPSEC packets 
Message-ID:  <4738.996871130@itojun.org>
In-Reply-To: fenner's message of Fri, 03 Aug 2001 10:53:13 MST. <200108031753.KAA19454@windsor.research.att.com> 

next in thread | previous in thread | raw e-mail | index | archive | help

>>	was the fix committed to sys/net/if_tun.c?  i guess other *BSDs have
>>	the same issue.
>I just committed it.
>If anyone is interested in tracking down the problem in the IPSEC stack,
>the problem only seems to occur when the data is in a cluster mbuf
>(thus Chris's observation that small packets get through).  My observation
>was:
>mbuf 1: IP header
>mbuf 2: AH header
>mbuf 3: ESP header
>mbuf 4: 0 length
>mbuf 5: cluster mbuf containing data

	this is perfectly legal, and can happen by result of m_cat()/m_split()
	calls from ipsec code.

itojun

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-net" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4738.996871130>