Re: git: 54c62e3e5d8c - main - pf: work around icmp6 packet-too-big not being sent when binat-ing
Date: Wed, 24 Jan 2024 16:28:38 UTC
On Wed, 24 Jan 2024 14:27:19 +0100, Kristof Provost wrote: > On 24 Jan 2024, at 11:06, Herbert J. Skuhra wrote: > > On Tue, 23 Jan 2024 19:42:10 +0100, Kristof Provost wrote: > >> On 23 Jan 2024, at 19:32, Herbert J. Skuhra wrote: > >>> On Mon, 22 Jan 2024 13:52:51 +0100, Kristof Provost wrote: > >>>> > >>>> The branch main has been updated by kp: > >>>> > >>>> URL: > >>>> https://cgit.FreeBSD.org/src/commit/?id=54c62e3e5d8cd90c5571a1d4c8c5f062d580480e > >>>> > >>>> commit 54c62e3e5d8cd90c5571a1d4c8c5f062d580480e > >>>> Author: Kristof Provost <kp@FreeBSD.org> > >>>> AuthorDate: 2024-01-17 17:11:27 +0000 > >>>> Commit: Kristof Provost <kp@FreeBSD.org> > >>>> CommitDate: 2024-01-22 11:52:14 +0000 > >>>> > >>>> pf: work around icmp6 packet-too-big not being sent when > >>>> binat-ing > >>>> > >>>> If we're applying NPTv6 we pass a packet with a modified > >>>> source and/or > >>>> destination address to the network stack. > >>>> > >>>> If that packet then turns out to be larger than the MTU of > >>>> the sending > >>>> interface the stack will attempt to generate an icmp6 > >>>> packet-too-big > >>>> error, but may fail to look up the appropriate source address > >>>> for that > >>>> error message. Even if it does, pf would still have to undo > >>>> the binat > >>>> operation inside the icmp6 packet so the sending host can > >>>> make sense of > >>>> the error. > >>>> > >>>> We can avoid both problems entirely by having pf also perform > >>>> the MTU > >>>> check (taking the potential refragmentation into account), and > >>>> generating the icmp6 error directly in pf. > >>>> > >>>> See also: https://redmine.pfsense.org/issues/14290 > >>>> Sponsored by: Rubicon Communications, LLC ("Netgate") > >>>> Differential Revision: https://reviews.freebsd.org/D43499 > >>>> --- > >>>> sys/net/pfvar.h | 1 + > >>>> sys/netpfil/pf/pf.c | 12 ++++++++++++ > >>>> sys/netpfil/pf/pf_norm.c | 15 +++++++++++++++ > >>>> 3 files changed, 28 insertions(+) > >>> > >>> Does this change cause problems for others too? > >>> > >>> - ssh over IPv6 permanently disconnecting > >>> (client_loop: send disconnect: Broken pipe) > >>> - ssh connections over IPv6 hanging > >>> - git pull not working > >>> Fssh_ssh_dispatch_run_fatal: Connection to > >>> 2604:1380:4091:a001::24ca:1 port 22: Permission denied > >>> fatal: Could not read from remote repository. > >>> > >> Can you include your pf.conf and a packet capture demonstrating one > >> of these issues? > > > > So I assume this issue affects only me or this server (igb nic). > > Disabling tso6 seems to resolve the issue. > > > Ah. A Clue(tm)! > > Try this: > > diff --git a/sys/netpfil/pf/pf.c b/sys/netpfil/pf/pf.c > index 38a5a45d7991..2dc6d02d330a 100644 > --- a/sys/netpfil/pf/pf.c > +++ b/sys/netpfil/pf/pf.c > @@ -8515,7 +8515,7 @@ pf_test6(int dir, int pflags, struct > ifnet *ifp, struct mbuf **m0, struct inpcb > * confused and fail to send the icmp6 packet too big > error. Just send > * it here, before we do any NAT. > */ > - if (dir == PF_OUT && IN6_LINKMTU(ifp) < pf_max_frag_size(m)) { > + if (dir == PF_OUT && pflags & PFIL_FWD && > IN6_LINKMTU(ifp) < pf_max_frag_size(m)) { > PF_RULES_RUNLOCK(); > *m0 = NULL; > icmp6_error(m, ICMP6_PACKET_TOO_BIG, 0, > IN6_LINKMTU(ifp)); This patch fixes the issue. Thanks a lot. -- Herbert