On Thu, 28 Nov 2024 10:15:58 +0100, Jan Klemkow wrote:
> On Wed, Nov 27, 2024 at 06:32:23PM GMT, Pascal Stumpf wrote:
> > Continuing from misc@:
> > 
> > I have two different gateway machines, one with em(4), one with igc(4)
> > that exhibit the problem.
> > 
> > With an iked.conf policy like this:
> > ikev2 "foo" esp \
> >     from 192.168.5.0/24 to dynamic \
> >     [...] \
> >     peer any \
> >     [...]
> > 
> > where 192.168.5.1 is an address on the gateway itself and the default
> > route is on pppoe0 upon vlan7 upon em0/igc0.  TCP MSS is clamped in
> > pf.conf for the IPSec tunnel:
> > 
> > match on enc0 all scrub (max-mss 1228)
> > 
> > This works as expected for any machine on the 192.168.5.0/24 network.
> > However, TCP connections to 192.168.5.1 will receive huge return packets
> > that get fragmented over pppoe0.
> > 
> > Setting net.inet.tcp.tso=0 restores expected behaviour.  So there is a
> > bug somewhere when making the decision to rely on TSO for TCP
> > segmentation.
> 
> Interesting.  I'll have a look at this next week.
> 
> Thanks for reporting this bug,
> Jan

Hi Jan,

have you been able to find out anything?  This bug is still present in
-current, unfortunately.

-Pascal

Reply via email to