kern/98219: pf needs a way of matching on decapsulated IPSEC packets

Dmitry Andrianov dimas at dataart.com
Wed May 31 08:00:44 PDT 2006


>Number:         98219
>Category:       kern
>Synopsis:       pf needs a way of matching on decapsulated IPSEC packets
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Wed May 31 15:00:36 GMT 2006
>Closed-Date:
>Last-Modified:
>Originator:     Dmitry Andrianov
>Release:        6.0
>Organization:
>Environment:
FreeBSD 6.0-RELEASE #0
>Description:
It seems there is no way to distinguis ordinary packet arrived from the wire from the one decapsulated from IPSEC ESP packet. When kernel is build with IPSEC_FILTERGIF, decapsulated packet appears arriving on the same interface on which original ESP packet arrived.

Normally you have to enable ESP packets:

  pass in quick on fxp0 proto esp from $vpn_peer to fxp0:any

But to avoid dropping decapsulated packets by firewall, you also need

  pass in quick on fxp0 from $vpn_remote_net to $local_net

But this rule will also allow any packet with spoofed IPs pretending to be from vpn_net to local_net to be accepted and processed.
>How-To-Repeat:

>Fix:

>Release-Note:
>Audit-Trail:
>Unformatted:


More information about the freebsd-bugs mailing list