Page MenuHomeFreeBSD

Requeue mbuf via netisr when we use IPSec tunnel mode and IPv6
ClosedPublic

Authored by ae on Apr 16 2015, 6:40 PM.
Tags
None
Referenced Files
Unknown Object (File)
Jan 29 2024, 11:12 PM
Unknown Object (File)
Dec 20 2023, 12:26 AM
Unknown Object (File)
Dec 10 2023, 4:08 PM
Unknown Object (File)
Dec 9 2023, 12:40 PM
Unknown Object (File)
Aug 28 2023, 6:40 AM
Unknown Object (File)
Aug 24 2023, 4:47 PM
Unknown Object (File)
Aug 13 2023, 6:28 AM
Unknown Object (File)
Aug 2 2023, 6:21 PM
Subscribers
None

Details

Summary

ipsec6_common_input_cb() uses partial copy of ip6_input() to parse headers. But it isn't correct,when we use tunnel mode IPSec.

When we stripped outer IPv6 header from the decrypted packet, it becomes IPv4 packet and should be handled by ip_input.
Also when we use tunnel mode IPSec with IPv6 traffic, we should pass decrypted packet with inner IPv6 header to ip6_input, it will correctly handle it and also can decide to forward it.

skip variable points to offset where payload starts. In tunnel mode we reset it to zero after stripping the outer header. So, when it is zero, we should requeue mbuf via netisr.

Diff Detail

Repository
rS FreeBSD src repository - subversion
Lint
Lint Skipped
Unit
Tests Skipped

Event Timeline

ae retitled this revision from to Requeue mbuf via netisr when we use IPSec tunnel mode and IPv6.
ae updated this object.
ae edited the test plan for this revision. (Show Details)
ae added a reviewer: network.
adrian added a reviewer: adrian.
This revision is now accepted and ready to land.Apr 17 2015, 7:25 AM
gnn added a reviewer: gnn.
ae updated this revision to Diff 4899.

Closed by commit rS281694 (authored by @ae).