[Bug 242744] IPSec in transport mode between FreeBSD hosts blackholes TCP traffic

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Tue Dec 24 14:20:59 UTC 2019


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=242744

--- Comment #20 from Victor Sudakov <vas at sibptus.ru> ---
(In reply to Eugene Grosbein from comment #15)
I've made a quick and dirty script which I run from the remote block.

It seems that this workaround does work.

#!/bin/sh

if echo $REMOTE_ADDR | grep -q ":" ; then
        gw=$(route -6 -n get "$REMOTE_ADDR" | awk '/gateway: / {print $2}')
        else
        gw=$(route -4 -n get "$REMOTE_ADDR" | awk '/gateway: / {print $2}')
fi

case "${1}" in
phase1_up)
        route add -host $REMOTE_ADDR -mtu 1200 $gw
        ;;
*)
        route delete -host $REMOTE_ADDR
        ;;
esac

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-net mailing list