[Bug 207055] ipv6 pmtu discovery not working with pf active

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Tue Feb 9 11:32:04 UTC 2016


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207055

            Bug ID: 207055
           Summary: ipv6 pmtu discovery not working with pf active
           Product: Base System
           Version: 10.2-STABLE
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: kern
          Assignee: freebsd-bugs at FreeBSD.org
          Reporter: hm at hellmuth-michaelis.de
                CC: freebsd-amd64 at FreeBSD.org
                CC: freebsd-amd64 at FreeBSD.org

IPv6 path mtu discovery is not working when pf is enabled and active.

OS Version is 10.3 BETA1

A very similar bug was reported in 115413, and i see that the there mentioned
patch is applied, but v6 pmtu is still not working.

There was already a mail sent to freebsd-net some time ago with a detailed
description of what is happening and things i tried, it can be found at
https://lists.freebsd.org/pipermail/freebsd-net/2014-May/038590.html

The problem is, that the machine in question sends out an (obviously) too large
packet. The router (which is also a FreeBSD machine being the gateway to sixxs)
detects this and sends an ICMP Packet too big back.

In case pf is disabled, all is fine and you can see the updated mtu in
net.inet.tcp.hostcache.list.

As soon as you enable pf, this does not take place anymore and the router sends
the ICMP too big messages 4 or 5 times and the connection hangs and no update
to net.inet.tcp.hostcache.list is taking place.

At the first time i saw this, it was a 2014 FreeBSD 10, now i upgraded the
machine to 10.3 BETA1 and the effect is still the same.

I made a patch to /usr/src/sys/netpfil/pf/pf.c with a shortcircuit and some
printfs and then pmtu functions again with pf enabled (you see it in
net.inet.tcp.hostcache.list) - i think this is not a fix but at least a
workaround:

*** pf.c-DIST   Thu Jan 14 12:06:14 2016
--- pf.c        Mon Feb  8 16:23:41 2016
***************
*** 4759,4766 ****
                                        pf_print_state(*state);
                                        printf(" seq=%u\n", seq);
                                }
!                               REASON_SET(reason, PFRES_BADSTATE);
!                               return (PF_DROP);
                        } else {
                                if (V_pf_status.debug >= PF_DEBUG_MISC) {
                                        printf("pf: OK ICMP %d:%d ",
--- 4759,4780 ----
                                        pf_print_state(*state);
                                        printf(" seq=%u\n", seq);
                                }
!                               if(icmptype != ICMP6_PACKET_TOO_BIG)
!                               {
!                                       REASON_SET(reason, PFRES_BADSTATE);
!                                       return (PF_DROP);
!                               }
!                               else
!                               {
!                                       printf("pf: suspicious ICMP %d:%d ",
!                                           icmptype, pd->hdr.icmp->icmp_code);
!                                       pf_print_host(pd->src, 0, pd->af);
!                                       printf(" -> ");
!                                       pf_print_host(pd->dst, 0, pd->af);
!                                       printf(" state: ");
!                                       pf_print_state(*state);
!                                       printf(" seq=%u\n", seq);
!                               }
                        } else {
                                if (V_pf_status.debug >= PF_DEBUG_MISC) {
                                        printf("pf: OK ICMP %d:%d ",

-- 
You are receiving this mail because:
You are on the CC list for the bug.


More information about the freebsd-amd64 mailing list