Description of problem: We get on one of our vpn server the following error : Oct 24 08:09:00 cestiavpn pluto[1099]: packet from 86.212.214.22:4500: recvfrom 86.212.214.22:4500 has no Non-ESP marker Oct 24 08:09:03 cestiavpn pluto[1099]: packet from 86.212.214.22:4500: recvfrom 86.212.214.22:4500 has no Non-ESP marker Oct 24 08:09:09 cestiavpn pluto[1099]: packet from 86.212.214.22:4500: recvfrom 86.212.214.22:4500 has no Non-ESP marker Oct 24 08:09:31 cestiavpn pluto[1099]: packet from 86.212.214.22:4500: recvfrom 86.212.214.22:4500 has no Non-ESP marker Oct 24 08:09:34 cestiavpn pluto[1099]: packet from 86.212.214.22:4500: recvfrom 86.212.214.22:4500 has no Non-ESP marker Oct 24 08:09:40 cestiavpn pluto[1099]: packet from 86.212.214.22:4500: recvfrom 86.212.214.22:4500 has no Non-ESP marker Oct 24 08:09:59 cestiavpn pluto[1099]: packet from 86.212.214.22:4500: recvfrom 86.212.214.22:4500 has no Non-ESP marker Oct 24 08:10:02 cestiavpn pluto[1099]: packet from 86.212.214.22:4500: recvfrom 86.212.214.22:4500 has no Non-ESP marker and at the same time the vpn tunnel concerned do not work altough it is up and running (both phases 1 and 2 are ok). The problem is a well known problem in kernel ipsec that is triggered when using e1000 driver and ipsec. It has been corrected in 2.6.19 : ,---[http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19]- commit 753eab76a3337863a0d86ce045fa4eb6c3cbeef9 Author: Olaf Kirch <okir> Date: Wed Nov 22 20:11:42 2006 -0800 [UDP]: Make udp_encap_rcv use pskb_may_pull Make udp_encap_rcv use pskb_may_pull IPsec with NAT-T breaks on some notebooks using the latest e1000 chipset, when header split is enabled. When receiving sufficiently large packets, the driver puts everything up to and including the UDP header into the header portion of the skb, and the rest goes into the paged part. udp_encap_rcv forgets to use pskb_may_pull, and fails to decapsulate it. Instead, it passes it up it to the IKE daemon. Signed-off-by: Olaf Kirch <okir> Signed-off-by: Jean Delvare <jdelvare> Signed-off-by: David S. Miller <davem> `--- (note that in our case, this is not a notebook, but a Dell 860 with an additionnal intel ethernet card) Version-Release number of selected component (if applicable): kernel-2.6.18-8.1.14.el5 How reproducible: 100% reproductible in our environement (RHEL 5 + kernel 2.6.18-8.1.14.el5 + openswan + a natted tunnel + intel e1000 driver). Upgrading to the (non RHEL 5 official) Kernel 2.6.20-1.2320.fc5 correct the problem as a patch to issue that bug was incorporated in kernel 2.6.19. In order to fix ipsec in natted environement (roadwarriors), you need to backport this fix in the RHEL5 official kernel.
I've placed a test kernel with the backport of this patch here: http://people.redhat.com/nhorman could you please test it out and confirm that it solves the problem in your environment? Thanks!
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release.
This request was previously evaluated by Red Hat Product Management for inclusion in the current Red Hat Enterprise Linux release, but Red Hat was unable to resolve it in time. This request will be reviewed for a future Red Hat Enterprise Linux release.
ping, any update here?
2nd, ping. If I don't hear from you in the next few weeks on this, I'll assume that this patch does fix the problem and move forward with integration
in kernel-2.6.18-99.el5 You can download this test kernel from http://people.redhat.com/dzickus/el5
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2009-0225.html