[Bug 242744] IPSec in transport mode between FreeBSD hosts blackholes TCP traffic
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Tue Dec 24 14:20:59 UTC 2019
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=242744
--- Comment #20 from Victor Sudakov <vas at sibptus.ru> ---
(In reply to Eugene Grosbein from comment #15)
I've made a quick and dirty script which I run from the remote block.
It seems that this workaround does work.
#!/bin/sh
if echo $REMOTE_ADDR | grep -q ":" ; then
gw=$(route -6 -n get "$REMOTE_ADDR" | awk '/gateway: / {print $2}')
else
gw=$(route -4 -n get "$REMOTE_ADDR" | awk '/gateway: / {print $2}')
fi
case "${1}" in
phase1_up)
route add -host $REMOTE_ADDR -mtu 1200 $gw
;;
*)
route delete -host $REMOTE_ADDR
;;
esac
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-net
mailing list