https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=221137
--- Comment #5 from ig...@speechpro.com --- I have used M_SKIP_FIREWALL to avoid reintroducing packet into pfil_run_hooks(). As ICMP redirects are not very common, and if there are no much trouble with reprocessing packet in input firewall rules we can remove M_SKIP_FIREWALL from my patch. Or use some different flag. Also I have not found any places referencing to M_SKIP_FIREWALL except ip_output.c. And it is called after ip_input(). So with my patch ip_tryforward() will be used most of the time. And in rare cases when ICMP redirect should be sent it will not be used. But I have nothing against using net.inet.ip.redirect as flag for disablinmg fast path and enabling ICMP redirects. -- You are receiving this mail because: You are the assignee for the bug. _______________________________________________ freebsd-net@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"