https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701200

This is a serious issue, many providers these days assign a globally
routable ipv6 address to all systems.  Our users could be running on
systems they think are protected yet have every port exposed on ipv6
transport.

IMO this should be backported via a security release into current stable.
It's an extremely low-risk fix and would immediately provide additional
security to users using the default ruleset.

--Adam

Reply via email to