ClearOS Bug Tracker


View Issue Details Jump to Notes ] Issue History ] Print ]
IDProjectCategoryView StatusDate SubmittedLast Update
0012331ClearOSapp-firewall - Firewallpublic2017-01-12 10:442020-03-05 02:08
Reporteruser2 
Assigned To 
PrioritynormalSeveritytweakReproducibilityhave not tried
StatusclosedResolutionsuspended 
PlatformOSOS Version
Product Version 
Target VersionFixed in Version 
Summary0012331: Consider disabling rp_filter on IPsec systems
DescriptionSee Libreswan FAQ:

https://libreswan.org/wiki/FAQ#Why_is_it_recommended_to_disable_rp_filter_in_.2Fproc.2Fsys.2Fnet_.3F [^]
TagsNo tags attached.
Attached Files

- Relationships

-  Notes
(0004621)
NickH (developer)
2017-01-24 06:59

Please also see \libreswan-3.19\docs\examples\sysctl.conf in the source file for other recommendations. Note ClearOS changes net.ipv4.ip_forward "on the fly" so changing it in systctl.conf is not necessary.
(0005451)
user2
2017-04-26 08:22

After review, it would be good to see how this change impacts a couple of dozen systems. Unfortunately, we don't have an easy path to QA such changes in ClearOS 7.
(0005461)
NickH (developer)
2017-04-26 13:26

Better link to the libreswan sysctl.conf recommendations:
https://github.com/libreswan/libreswan/blob/master/docs/examples/sysctl.conf [^]
(0013391)
NickH (developer)
2020-03-05 02:08

https://gitlab.com/clearos/clearfoundation/app-firewall/issues/27 [^]

- Issue History
Date Modified Username Field Change
2017-01-12 10:44 user2 New Issue
2017-01-12 10:44 user2 Assigned To => user2
2017-01-12 10:44 user2 Status new => confirmed
2017-01-24 06:59 NickH Note Added: 0004621
2017-04-26 08:20 user2 Target Version 7.3.1 Updates =>
2017-04-26 08:22 user2 Note Added: 0005451
2017-04-26 13:26 NickH Note Added: 0005461
2018-12-14 12:11 user2 Status confirmed => assigned
2018-12-14 12:11 user2 Assigned To user2 => tracker
2020-03-05 02:08 NickH Note Added: 0013391
2020-03-05 02:08 NickH Status assigned => closed
2020-03-05 02:08 NickH Assigned To tracker =>
2020-03-05 02:08 NickH Resolution open => suspended