CORRECTION 13.1: "ipfw forward" TESTCASE for crosscheck

2022-03-27 Thread Peter
Message before was missing the most essential line (cut+paste error), correction as below. And I think I have found why some of my systems are not concerned by the bug: apparently the problem appears only with packets that are locally created. Packets that are traversed (with net.inet.ip.forward

13.1: "ipfw forward" TESTCASE for crosscheck

2022-03-27 Thread Peter
I did now a testcase, as follows: === root@zwlf:~ # cat /boot/loader.conf net.fibs="3" net.inet.ip.fw.default_to_accept=1 root@zwlf:~ # uname -a FreeBSD zwlf 12.3-RELEASE FreeBSD 12.3-RELEASE r371126 GENERIC amd64 root@zwlf:~ # k