kern/121374: SP refcnt increases with each packet in ipv6 with new
IPSEC
Cyrus Rahman
crahman at gmail.com
Wed Mar 5 00:40:01 UTC 2008
>Number: 121374
>Category: kern
>Synopsis: SP refcnt increases with each packet in ipv6 with new IPSEC
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: freebsd-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Wed Mar 05 00:40:00 UTC 2008
>Closed-Date:
>Last-Modified:
>Originator: Cyrus Rahman
>Release: 7.0-RELEASE
>Organization:
>Environment:
FreeBSD snowfall.signetica.com 7.0-RELEASE FreeBSD 7.0-RELEASE #6: Tue Mar 4 16:27:33 MST 2008 cr at snowfall.signetica.com:/usr/src/sys/i386/compile/SIGNETICA i386
>Description:
Ok, this is actually probably more serious than I say, because when refcnt overflows KASSERT will cause some trouble. But obviously no one is actually using ipv6 with IPSEC yet.
Anyway, if one creates an ipv6 association between two hosts with the new IPSEC,
each packet will increment the refcnt:
root# setkey -PD
hostA[any] hostB[any] any
out ipsec
esp/transport//use
spid=3 seq=0 pid=1554
refcnt=65
root# ping6 hostB
.. some packets go by
root# setkey -PD
hostA[any] hostB[any] any
out ipsec
esp/transport//use
spid=3 seq=0 pid=1635
refcnt=77
This problem does not occur with ipv4.
>How-To-Repeat:
>Fix:
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-bugs
mailing list