Current-Users archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: npf blocks ipv6 fragmented packets (?)



Markus Kilbinger <mk%kilbi.de@localhost> writes:

> Tracking it down (a bit) i've found that simply activating npf without any rule
>
>   ntpctl start
>
> 'blocks' a
>
>   ping6 -s 2048 testhost
>
> which worked w/o npf aktivated flawlessly.
> BTW: ipv4 fragmented packets seems to be handled correctly under npf
> ('ping -s 2048' works).
> This happens under HEAD and netbsd-7.
>
> Is this a known limitation of npf? Or a bug?
> Send-pr?

If it's not documented in the man page, sure, file a PR.
Actually, even if documented, a PR is in order...

Attachment: pgpQ66xAZiPje.pgp
Description: PGP signature



Home | Main Index | Thread Index | Old Index