Chris Buechler wrote:

I presume you're talking about a stock FreeBSD install?


I'm talking about the FreeBSD sources that were used to compile the kernel that pfsense uses.

I don't believe the NAT-T patches are in the pfsense kernel, something about a security issue with them was reported by one of our developers and the patch was pulled. I'm not familiar with any details.


Thats interesting. Has anyone notified Yvan about the potential security problem? I'm sure he would be interested in looking into it.

If the issue is the lack of NAT-T, that would be expected I believe. (Scott or somebody jump in and correct me here if I'm off base)


The racoon binary was obviously compiled with NATT support on a system that had the kernel patch applied. Otherwise it wouldn't be attempting to set the UDP_ENCAP_ESPINUDP_NON_IKE socket option doesn't exist in udp.h until the patch is applied ...

Index: netinet/udp.h
===================================================================
RCS file: /home/ncvs/src/sys/netinet/udp.h,v
retrieving revision 1.9
diff -b -u -p -r1.9 udp.h
--- netinet/udp.h       7 Jan 2005 01:45:45 -0000       1.9
+++ netinet/udp.h       19 Sep 2006 12:44:49 -0000
@@ -44,4 +44,17 @@ struct udphdr {
        u_short uh_sum;                 /* udp checksum */
 };

+/* socket options for UDP */
+#define UDP_ENCAP      100
+
+/* Encapsulation types */
+#define UDP_ENCAP_ESPINUDP_NON_IKE 1 /* draft-ietf-ipsec-nat-t-ike-00/01 */
+#define UDP_ENCAP_ESPINUDP             2 /* draft-ietf-ipsec-udp-encaps-02+ */
+
+/* Default encapsulation port */
+#define UDP_ENCAP_ESPINUDP_PORT                500
+
+/* Maximum UDP fragment size for ESP over UDP */
+#define UDP_ENCAP_ESPINUDP_MAXFRAGLEN  552
+
 #endif

-Matthew

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to