Am 04.03.14 11:37, schrieb Vladimir V. Kamarzin:
> From: "Vladimir V. Kamarzin" <v...@vvk.pp.ru>
>
> When working in TAP mode, openvpn at server side maintains mapping table
> "MAC" -> "client". It needs to know what MAC belongs to what client to
> be able to forward traffic.
>
> Before this change extraction of MAC addresses was performed only from
> ethernet headers of packets, coming from the client. This patch
> introduces extraction from ARP packets.
>
> Why extraction only from ethernet header may be not enought? Obviously
> in such cases, when MAC in ethernet header differs from ARP message
> "Sender Hardware Address" field. For example, one device (A) performs
> handling of ARP traffic for other device (B) on the client side (C)
> connected to server (S) via TAP (server bridge mode). Unless (B) send
> some traffic to server-side network, it will be inaccessible because ARP
> handling performed by (A) and not (B) itself.
>
>
OpenVPN basically just emulates a learning switch. Learning switches
also don't need these special logic. If your setup does not work with
OpenVPN then either

a) it won't work with a learning switch either or
b) OpenVPN learning switch implementation has a bug

I would like to have either a) confirmed or b) fixed than to included a
band aid.

Arne

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to