summaryrefslogtreecommitdiffstats
path: root/sys
diff options
context:
space:
mode:
authorguido <guido@FreeBSD.org>2002-10-16 09:01:48 +0000
committerguido <guido@FreeBSD.org>2002-10-16 09:01:48 +0000
commit76c09c025383a07b70a19a5da1c07bd97c727209 (patch)
treee72c8aaa90d514e575cb8e47b78e4c2b70cc1212 /sys
parent42dda6b2e85c3a2f926b90cfd200aaa3c06d3f3b (diff)
downloadFreeBSD-src-76c09c025383a07b70a19a5da1c07bd97c727209.zip
FreeBSD-src-76c09c025383a07b70a19a5da1c07bd97c727209.tar.gz
Get rid of checking for ip sec history. It is true that packets are not
supposed to be checked by the firewall rules twice. However, because the various ipsec handlers never call ip_input(), this never happens anyway. This fixes the situation where a gif tunnel is encrypted with IPsec. In such a case, after IPsec processing, the unencrypted contents from the GIF tunnel are fed back to the ipintrq and subsequently handeld by ip_input(). Yet, since there still is IPSec history attached, the packets coming out from the gif device are never fed into the filtering code. This fix was sent to Itojun, and he pointed towartds http://www.netbsd.org/Documentation/network/ipsec/#ipf-interaction. This patch actually implements what is stated there (specifically: Packet came from tunnel devices (gif(4) and ipip(4)) will still go through ipf(4). You may need to identify these packets by using interface name directive in ipf.conf(5). Reviewed by: rwatson MFC after: 3 weeks
Diffstat (limited to 'sys')
-rw-r--r--sys/netinet/ip_input.c5
1 files changed, 0 insertions, 5 deletions
diff --git a/sys/netinet/ip_input.c b/sys/netinet/ip_input.c
index f22d550..3c4a5ae 100644
--- a/sys/netinet/ip_input.c
+++ b/sys/netinet/ip_input.c
@@ -421,11 +421,6 @@ tooshort:
m_adj(m, ip->ip_len - m->m_pkthdr.len);
}
-#ifdef IPSEC
- if (ipsec_gethist(m, NULL))
- goto pass;
-#endif
-
/*
* IpHack's section.
* Right now when no processing on packet has done
OpenPOWER on IntegriCloud