tech-net archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: PFIL for IPsec tunneled packets (was: reverse processing order: NAT, IPsec?)




On Thu, 25 Jun 2009, Edgar Fuß wrote:
Applying this "fix" would break my installation. At least as long as those packets are indistinguishable from non-IPsec traffic arriving on the same interface. Currently, packets arriving on the gateway's external interface but appearing to come from an internal network are dropped by anti-spoofing filter rules. ESP traffic passes, and the de-encapsulated packets are never seen again by the packet filter. If they were, they should be somehow marked as being de-encapsulated---otherwise they would be dropped by the anti-spoof rules.

Are you sure? Looking at the code, only the pfil_run_hooks() call is ran only for encapsulated packages, everything else is outside that codepath. Or do you have those anti-spoofing rules in your packet filter (PF/IPfilter) config?

Also, if you don't run the PFIL_HOOKS on the decapsulated package, how do you prevent someone from sending "internal" packets via IPSEC - plain trust?


 - Hubert (still trying to get a grip on the code)


Home | Main Index | Thread Index | Old Index