From nobody Sun Jul 21 10:46:40 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4WRg810MTXz5RGk1 for ; Sun, 21 Jul 2024 10:46:41 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R11" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4WRg805ZjQz4Dxy for ; Sun, 21 Jul 2024 10:46:40 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1721558800; a=rsa-sha256; cv=none; b=ZlJSZBmLVtDdlwbq2T15mndc4KET3J5KgrIZlwSxi7h0IHS/R+CsCCmnGf9b+TLA4uHlRq XScJEPZjcoXhFS+jP2R/ibLgARTjTHY/2n2AdwbuEKmx6i+fnM6w+8+oublcCYTuLQEJKW ypISateT4+bZsSFio220QQWrlTYbGKhLu13e9nHvPRLD2qybnyghsuoG0nVHa1JVQ3ezbO HwhOZWcnadXQ9tLTbdt1nQ6jmey0zZpxkuS1AXOps6PTNPe2B2POulf+164w/jmve2pozD uJSgrTclpR9gVxxiz1dsumH3FOvK7hPRinTFoEugMIVZfOWxEMtuhT1Wqn9onA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1721558800; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=/lmaE0T4Dz7p5jJEKDK2IbC+9n2u1jMMCTZIZDHnyxI=; b=jDrNmXuxs69xmR+MFHFN63tp1lH3pa4Z7XmVjrNmXyZmePrj5WpZIxKFwwTGyLRQiwT+gf UOMlClSk8uiUDpEsdifT6Oa6uAfX6fsKAevtjWoH9/6ZCGgAtSKHbDVD1ZkFPwWwLuUGBy La2EtbMmQs1XjRWmUmKt35szqo9ixk0C93lSCl10CoMFsQ5o1sqlSJOQRrVqdEf0z9sDiq tBIWjbBjJnZJe1S6vCkomnbFGcEt3knJmEoayulCL9VE38EWqjrmLrNxpJLpAOD+iZe0oJ 0/l3ze7br+O0ohn8bw9nBccsk9sTMkkE1uS91cVub/s3FvcDD10yg+vw/5C1Mw== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4WRg804yhQzx2R for ; Sun, 21 Jul 2024 10:46:40 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 46LAkeTO080276 for ; Sun, 21 Jul 2024 10:46:40 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 46LAke8D080270 for bugs@FreeBSD.org; Sun, 21 Jul 2024 10:46:40 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 280036] Data corruption over if_ovpn (OpenVPN DCO) observed Date: Sun, 21 Jul 2024 10:46:40 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: 3226388001@jcom.home.ne.jp X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D280036 --- Comment #3 from ss3bsd <3226388001@jcom.home.ne.jp> --- Has anyone else reproduced this? Since I have already decided not to use if_ovpn, this additional comment be= low will be the last one unless someone can reproduce the issue. -- The issue has been confirmed using Hyper-V (10.0.22621 [SP3]) too. Also, another issue (server-side file corrption during FTP GET over if_oven= ) is observed there. [procedure #2]=20 Test condition is almost same as the already reported one. Smaller test file is enough this time, but GET multiple times instead. ** prepare test data # dd if=3D/dev/random bs=3D1M count=3D4 of=3Drandomfile ** transfer data over if_ovpn (put and get back) ftp> put randomfile local: randomfile remote: randomfile 229 Entering Extended Passive Mode (|||56921|) 150 Opening BINARY mode data connection for 'randomfile'. 100% |**************************************************************************= ******************************| 4096 KiB 107.39 MiB/s 00:00 ETA 226 Transfer complete. 4194304 bytes sent in 00:00 (104.75 MiB/s) ftp> get randomfile randomfile.returned1 local: randomfile.returned1 remote: randomfile 229 Entering Extended Passive Mode (|||52890|) 150 Opening BINARY mode data connection for 'randomfile' (4194304 bytes). 100% |**************************************************************************= ******************************| 4096 KiB 106.43 MiB/s 00:00 ETA 226 Transfer complete. 4194304 bytes received in 00:00 (106.16 MiB/s) ftp> get randomfile randomfile.returned2 local: randomfile.returned2 remote: randomfile 229 Entering Extended Passive Mode (|||51626|) 150 Opening BINARY mode data connection for 'randomfile' (4194304 bytes). 100% |**************************************************************************= ******************************| 4096 KiB 112.00 MiB/s 00:00 ETA 226 Transfer complete. 4194304 bytes received in 00:00 (111.72 MiB/s) ftp> get randomfile randomfile.returned3 local: randomfile.returned3 remote: randomfile 229 Entering Extended Passive Mode (|||50186|) 150 Opening BINARY mode data connection for 'randomfile' (4194304 bytes). 100% |**************************************************************************= ******************************| 4096 KiB 116.54 MiB/s 00:00 ETA 226 Transfer complete. 4194304 bytes received in 00:00 (116.23 MiB/s) ftp> get randomfile randomfile.returned4 local: randomfile.returned4 remote: randomfile 229 Entering Extended Passive Mode (|||56341|) 150 Opening BINARY mode data connection for 'randomfile' (4194304 bytes). 100% |**************************************************************************= ******************************| 4096 KiB 96.91 MiB/s 00:00 ETA 226 Transfer complete. 4194304 bytes received in 00:00 (96.68 MiB/s) ftp> bye 221 Goodbye. # md5sum randomfile* 76b3ea410e4d56b9b684116a2a8319cb randomfile 76b3ea410e4d56b9b684116a2a8319cb randomfile.returned1 -- file is small,= so corruption at the network did not occur this time 13f1d329379862cd1e157eeb55c6a436 randomfile.returned2 -- the server-side file has been destroyed by the previous GET (*) 4d3846965ad68016d545ae4222a33ed5 randomfile.returned3 -- same as above ebfc8ff8ee13841599562a8a211c5b31 randomfile.returned4 -- same as above (*) example of the file corruption by GET command. -- At the ftp server side -- * before "get randomfile randomfile.returned4" # md5sum randomfile ebfc8ff8ee13841599562a8a211c5b31 randomfile -- matches to randomfile.returned4 at the client side later * after "get randomfile randomfile.returned4" # md5sum randomfile 5a49c61306c82a4c57768876b95c4ae4 randomfile -- destroyed --=20 You are receiving this mail because: You are the assignee for the bug.=