From nobody Tue Oct 18 18:28:18 2022 X-Original-To: ports-bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4MsMmy6DsKz4f9FJ for ; Tue, 18 Oct 2022 18:28:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4MsMmy4ZSmz3hhw for ; Tue, 18 Oct 2022 18:28:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4MsMmy3X0QzGbR for ; Tue, 18 Oct 2022 18:28:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 29IISIY0001416 for ; Tue, 18 Oct 2022 18:28:18 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 29IISIYO001415 for ports-bugs@FreeBSD.org; Tue, 18 Oct 2022 18:28:18 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 267178] security/softether Date: Tue, 18 Oct 2022 18:28:18 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: karl@denninger.net X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: meta@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Ports bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-ports-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports-bugs@freebsd.org X-BeenThere: freebsd-ports-bugs@freebsd.org MIME-Version: 1.0 ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1666117698; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=5VRba5y4+7DueQ1PnZJ5RIr1uDEVA0x8g0+I2kbwvTk=; b=AkgYrg5E/Et0b35a+C9v8nz+nyu0HUMIBJ7H0cTTmqlpFdP5ODnsLQhV16S3huSCsHH7rP lXkBmEWxgu2/cvxdbT0wpJ42du/fF/BkaugxeIgFzeiJg/HV5UzL+oeGQ+r7R/SoQwwmWB JXLvhh/uBTZr32PHA8W3ZWPmz73z8cjiQX7WwxyuBO+3JEdH2cE6WJnXXX1NrKbt+m7xV0 hAOdgm7tmw1FAw46H89aBgdX2TxCZfYTqTEqn0QueBl4cTB4ofBgVKsygx40+J0T6uA+21 kX6UDP/PNFnN+kjq9KJx6wH9RXVNdrXFI2O9YUos6Gs1jDlySZAIC8vtEXVtNw== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1666117698; a=rsa-sha256; cv=none; b=hFvwgu6xLuV24vv9WCn8nDBwKHXnat6zDhLzazjqqfqBv8ECh2JbhMB+wETuAYAhSjmo9X SIo+Az/GVoRC9VSo+g7nZPytvmGatMA2cjknG0xYHS1LOnphIa3XNSHhxOaMLpzZimzto3 I5GD+krBolq3y7VU5wuD02EdMDiD2oTvsuoTq4FqaZwS9RWvKj9iXPqkoGoJ+Jtg9g81VH ke4DUAuqA4H1YCC0+V08uxGMETpF7mwtkd9XD4Kf7TN+j3ckTdKQiA0VkG2Sx7Wb3r1b24 pU/iHGkKKbiomD46RJ1wliyC+tTOaUmngiMxv4y2CBKWEX64YwBPQGMwrVxeDA== ARC-Authentication-Results: i=1; mx1.freebsd.org; none X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D267178 Bug ID: 267178 Summary: security/softether Product: Ports & Packages Version: Latest Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: meta@FreeBSD.org Reporter: karl@denninger.net Assignee: meta@FreeBSD.org Flags: maintainer-feedback?(meta@FreeBSD.org) Created attachment 237439 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D237439&action= =3Dedit Shut off MTU increases if compiled on FreeBSD This may impact everyone -- not sure, so labeling it "affects some people." The vpnserver code attempts to use jumbo frames and, when it tries to send larger frames than the current MTU, attempts to set the interface MTU high enough to accommodate it. This occurs unless the interface was opened "Raw= ", which is only supported in the code on Linux; for all other BSD variants the assumption is made that the MTU can be raised high enough to allow a transmission to fit. That would seem to be wishful thinking and the code d= oes indeed try to send data that won't fit in the default ethernet MTU. The result is a cascade of up/down events on the interface which never ends= as the server will try to send something larger than even a typical jumbo frame capability (e.g. 8k) and when it does, it will continually bang on the MTU trying to raise it, logging each such event as well. The following couple-of-line patch shuts this off if the code is built on FreeBSD and stops that behavior. As near as I can tell this has no bad side effects but my work with the package is, thus far, quite rudimentary so fur= ther testing is likely called for before accepting this as a build-time patch to= be applied. I've also reported this on the forum for the package itself here: https://www.vpnusers.com/viewtopic.php?f=3D7&t=3D67841 --=20 You are receiving this mail because: You are the assignee for the bug.=