[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 Ziomalski changed: What|Removed |Added Resolution|Not A Bug |FIXED --- Comment #23 from Ziomalski

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #22 from Michael Muenz --- (In reply to Eugene Grosbein from comment #21) Sure, they can. This is only related to *sense, so closing this one here is just fine. Thanks for all your efforts. -- You are receiving this mail beca

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 Eugene Grosbein changed: What|Removed |Added Resolution|--- |Not A Bug Status|New

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #21 from Eugene Grosbein --- (In reply to Michael Muenz from comment #20) Route-based and legacy policy-based IPsec tunnels co-exist just find on the same system. -- You are receiving this mail because: You are the assignee f

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-07 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #20 from Michael Muenz --- I have not tested too deeply but there *may* be strange side effects when using filtering and NAT (SPD) when using route-based and legacy policy-based IPsec tunnels on the same system. If the *sense i

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-06 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #19 from Ziomalski --- (In reply to Andrey V. Elsukov from comment #17) WOW. Thank you Andrey. I was able to get a connection after adding these changes. pfSense 2.4.5. I'm going to be doing more testing and hopefully get it in

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-06 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #18 from Michael Muenz --- (In reply to Andrey V. Elsukov from comment #17) Beautiful Andrey, really nice! That did it for OPNsense (pfSense for sure too). I'll add a note to the documentation to set a tunable. -- You are re

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-06 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #17 from Andrey V. Elsukov --- Did you tried disable if_enc's pfil handling? % sysctl net.enc | grep filter net.enc.out.ipsec_filter_mask: 0 net.enc.in.ipsec_filter_mask: 0 Also you can try enable filtertunnel variable % sys

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #16 from Eugene Grosbein --- (In reply to Michael Muenz from comment #14) Every transit packet coming from LAN to WAN first passes pfil hooks as incoming packet before routing lookup for destination, then routing lookup is perf

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #15 from Eugene Grosbein --- (In reply to Michael Muenz from comment #14) The patch could help only if unpached system shows growing counters in the output of: netstat -sp ipsec|fgrep "inbound packets violated" If you have pro

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #14 from Michael Muenz --- (In reply to Eugene Grosbein from comment #4) I added the patch and build a new pkg, but it doesn't change anything. Can see the translated packets but no ESP packets leaving WAN. -- You are receivin

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #13 from Eugene Grosbein --- (In reply to Andrey V. Elsukov from comment #11) IPSec code adds PACKET_TAG_IPSEC_IN_DONE tag to decrypted mbuf then calls pfil hooks. Bad things could happen if mbuf looses PACKET_TAG_IPSEC_IN_DONE

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #12 from Andrey V. Elsukov --- (In reply to Andrey V. Elsukov from comment #11) Probably you need to disable if_enc's pfil handling to avoid some confusions. -- You are receiving this mail because: You are the assignee for th

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #11 from Andrey V. Elsukov --- (In reply to Eugene Grosbein from comment #10) I have very basic knowledge about PF's internals, but I don't think the problem is with if_ipsec, it does nothing special after decryption, PF will s

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #10 from Eugene Grosbein --- (In reply to Andrey V. Elsukov from comment #9) Your notes are relevant for problems with outgoing traffic. Are they relevant for incoming traffic that is decrypted before it hits pfil hooks and the

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 Andrey V. Elsukov changed: What|Removed |Added CC||k...@freebsd.org --- Comment #

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 Michael Muenz changed: What|Removed |Added CC||m.mu...@gmail.com --- Comment #8 f

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #7 from Andrey V. Elsukov --- if_ipsec works with ipfw's NAT, we have many of such installations for years. I think you use PF and it won't work in some configurations, because of its design and how IPsec handled in FreeBSD. --

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 Eugene Grosbein changed: What|Removed |Added CC||a...@freebsd.org --- Comment #6

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #5 from Eugene Grosbein --- Also, it would be nice if you use unpatched system that exhibits the problem to monitor output of: netstat -sp ipsec|fgrep "inbound packets violated" Look if the counter grows when you try passing t

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #4 from Eugene Grosbein --- Created attachment 217021 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=217021&action=edit strongswan work-around patch Also, it is possible you hit obscure problem in kernel+strongswan c

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-05 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 Eugene Grosbein changed: What|Removed |Added CC||eu...@freebsd.org --- Comment #3

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-04 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 --- Comment #2 from Ziomalski --- (In reply to crest from comment #1) The reason I posted here was because of the following pfSense Dev response: https://forum.netgate.com/topic/155803/nat-still-broken-on-ipsec-vti/2 I am currently on pfS

[Bug 248474] NAT broken on IPsec/VTI [if_ipsec]

2020-08-04 Thread bugzilla-noreply
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=248474 Mark Linimon changed: What|Removed |Added Assignee|b...@freebsd.org|n...@freebsd.org -- You are receiv