Markus Kilbinger <mk%kilbi.de@localhost> writes: > Tracking it down (a bit) i've found that simply activating npf without any rule > > ntpctl start > > 'blocks' a > > ping6 -s 2048 testhost > > which worked w/o npf aktivated flawlessly. > BTW: ipv4 fragmented packets seems to be handled correctly under npf > ('ping -s 2048' works). > This happens under HEAD and netbsd-7. > > Is this a known limitation of npf? Or a bug? > Send-pr? If it's not documented in the man page, sure, file a PR. Actually, even if documented, a PR is in order...
Attachment:
pgpQ66xAZiPje.pgp
Description: PGP signature