| To: | steve@xxxxxxxxxxxxxxxxxxx |
|---|---|
| Subject: | Re: More IPSEC trouble |
| From: | Nicolas DICHTEL <nicolas.dichtel@xxxxxxxxx> |
| Date: | Thu, 10 Mar 2005 16:01:25 +0100 |
| Cc: | netdev@xxxxxxxxxxx |
| In-reply-to: | <Pine.LNX.4.61.0503101229380.18067@sorbus2.navaho> |
| References: | <Pine.LNX.4.61.0503101229380.18067@sorbus2.navaho> |
| Reply-to: | nicolas.dichtel@xxxxxxxxx |
| Sender: | netdev-bounce@xxxxxxxxxxx |
| User-agent: | Mozilla Thunderbird 1.0 (Windows/20041206) |
When the stack check the mtu for this packet, it doesn't know the size of the overhead. So the total length of the packet don't include the size of the esp or ah header. The same bug appears when you run IPSEC in IPv4 transport mode over a 4in4 tunnel. A fix for this bug is to allow locally the fragmentation of the packet. Nicolas Dichtel Here is a patch: --- a/linux26/net/ipv4/xfrm4_output.c Thu Mar 10 15:50:30 2005 +++ b/linux26/net/ipv4/xfrm4_output.c Thu Mar 10 15:51:49 2005 @@ -116,6 +116,9 @@ int xfrm4_output(struct sk_buff *skb) xfrm4_encap(skb); + /* We still allow to fragment this packet locally */ + skb->local_df = 1; + err = x->type->output(skb); if (err) goto error; Steve Hill wrote:
|
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: Do you know the TCP stack? (127.x.x.x routing), Dmitry Torokhov |
|---|---|
| Next by Date: | RE: Do you know the TCP stack? (127.x.x.x routing), Steve Iribarne |
| Previous by Thread: | More IPSEC trouble, Steve Hill |
| Next by Thread: | Re: More IPSEC trouble, Steve Hill |
| Indexes: | [Date] [Thread] [Top] [All Lists] |