On 03/12/17 00:47, Arne Schwabe wrote:
> Am 02.12.17 um 17:24 schrieb Antonio Quartulli:
>> Some ICMPv6 packets can't be dropped otherwise the entire
>> overlaying network layer (IPv6) would just stop working.
>>
>> Such packets are described in RFC4890, sec. 4.4.1.
>>
>> Improve the mroute packet parsing routine in order to detect
>> these specific packets types and thus avoid PF to drop them.
>>
>> This way, when PF is enabled, the user won't need to whitelist
>> any specific multicats IPv6 address. PF will just work as
>> expected.
> 
>  (&b);
>> +
>> +    switch (type)
>> +    {
>> +        /*
>> +         * By following the guideline of RFC4890, sec. 4.4.1, the
>> +         * following are the ICMPv6 packet types that are strictly
>> +         * required to let a host join a IPv6 network.
>> +         * Therefore, such packets can't be dropped by PF.
>> +         */
>> +        case OPENVPN_ND_ROUTER_SOLICIT:
>> +        case OPENVPN_ND_ROUTER_ADVERT:
>> +        case OPENVPN_ND_NEIGHBOR_SOLICIT:
>> +        case OPENVPN_ND_NEIGHBOR_ADVERT:
>> +        case OPENVPN_ND_INVERSE_SOLICIT:
>> +        case OPENVPN_ND_INVERSE_ADVERT:
>> +            return true;
>> +    }
>> +    return false;
>> +}
> 
> 
> I think we should still drop tehse if they do not target the local
> network. Otherwise you can just send all information hidden in these
> packet types.

You mean dropping packets not a having link-local address as destination
(for unicasts)?

Cheers,

-- 
Antonio Quartulli

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to