Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 31 Aug 2006 15:47:13 +0900
From:      SUZUKI Shinsuke <suz@freebsd.org>
To:        max@love2party.net
Cc:        suz@freebsd.org, freebsd-gnats-submit@freebsd.org, freebsd-pf@freebsd.org
Subject:   Re: kern/102647: Using pf stateful rules for inet6 fails for	connections originating from the firewall itself to a service	running on thesame box
Message-ID:  <x7ejuxjtam.wl%suz@alaxala.net>
In-Reply-To: <200608301339.42374.max@love2party.net>
References:  <200608291637.k7TGbNxd002409@www.freebsd.org>  <x71wqz6n5v.wl%suz@alaxala.net> <200608301339.42374.max@love2party.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi, Max.

>>>>> On Wed, 30 Aug 2006 13:39:34 +0200
>>>>> max@love2party.net(Max Laier)  said:

> another problem that maybe related.  The bottom line is that packets
> to or from local addresses never show up on bpf as they are not
> processed by lo0's input/output routines.  Do you have any idea how
> to address this?

It is a spec (bug?) of if_simloop() (net/if_loop.c), not regarding
this problem.

- The BPF of the physical interface, instead of lo0, detects the packet.
	% ping6 fe80::20c:29ff:fe54:6378%lnc2
	16 bytes from fe80::20c:29ff:fe54:6378%lnc2, icmp_seq=0 hlim=64 time=2.857 ms

	% tcpdump -X -ni lnc2
	3a:40:fe:80:00:00 > 60:00:00:00:00:10 Null Information, send seq 1, rcv seq 6, Flags [Command], length 42
	0x0000:  0000 020c 29ff fe54 6378 fe80 0000 0000  ....)..Tcx......
	0x0010:  0000 020c 29ff fe54 6378 8000 3c25 0bfe  ....)..Tcx..<%..
	0x0020:  0000 44f6 81de 0004 5806                 ..D.....X.
	
	3a:40:fe:80:00:00 > 60:00:00:00:00:10 Null Information, send seq 1, rcv seq 6, Flags [Command], length 42
        0x0000:  0000 020c 29ff fe54 6378 fe80 0000 0000  ....)..Tcx......
        0x0010:  0000 020c 29ff fe54 6378 8100 3b25 0bfe  ....)..Tcx..;%..
        0x0020:  0000 44f6 81de 0004 5806                 ..D.....X.
    
- if_simloop() just passes the received mbuf to the BPF of the
  physical interface in case of IPv6.  (please see the following code)
   
	if (ifp->if_bpf) {
		if (ifp->if_bpf->bif_dlt == DLT_NULL) {
			u_int32_t af1 = af;	/* XXX beware sizeof(af) != 4 */
			bpf_mtap2(ifp->if_bpf, &af1, sizeof(af1), m);
			<= this one is called in case of IPv4,
			   since ifp=lo0
		} else
			bpf_mtap(ifp->if_bpf, m);
			<= this one is normally called in case of IPv6,
			   since ifp=physical I/F and physical I/F's DLT is
			   normally DLT_EN10MB
	}

- However, due to a lack of correct layer2 header information, the BPF
  cannot display the packet correctly. (A dummy padding can partly
  solve the problem.  But it would be problematic in terms of BPF
  filtering based on layer-2 information...)
  

Thanks,
----
SUZUKI, Shinsuke @ KAME Project




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?x7ejuxjtam.wl%suz>