Subject: kern/28662: 'rdr ti0 0.0.0.0/0 port 80 ->..' matches ipv6 addresses in ipfilter 4.1.3
To: None <kern-bug-people@netbsd.org, gnats-admin@netbsd.org,>
From: Markus W Kilbinger <kilbi@rad.rwth-aachen.de>
List: netbsd-bugs
Date: 12/15/2004 01:38:00
>Number:         28662
>Category:       kern
>Synopsis:       'rdr ti0 0.0.0.0/0 port 80 ->..' matches ipv6 addresses in ipfilter 4.1.3
>Confidential:   no
>Severity:       serious
>Priority:       high
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Wed Dec 15 01:38:00 +0000 2004
>Originator:     kilbi@rad.rwth-aachen.de
>Release:        NetBSD 2.99.11
>Organization:
>Environment:
	
	
System: NetBSD mogli 2.99.11 NetBSD 2.99.11 (MOGLI) #0: Tue Dec 14 15:39:46 MET 2004 root@lwle5:/usr/src/sys/arch/i386/compile/MOGLI i386
Architecture: i386
Machine: i386
>Description:
	While setting up squid's transparent proxying with ipfilter on
	a ipv6 capable firewall I noticed that ipnat rules like

	  rdr ti0 0.0.0.0/0 port 80 -> localhost port 3128 tcp

	seem to match ipv6 addresses, too!?

	While ipv4 http request from intern (ti0) are correctly
	redirected to squid's port (3128) on localhost all ipv6 http
	request do not pass the firewall at all. ipv6 request to other
	ports work fine.

	Just disabling the above mentioned ipnat rule make ipv6 http
	request work again.

	So, my conclusion is that the '0.0.0.0/0' ipv4 wildcard
	matches falsely ipv6 addresses, too.
>How-To-Repeat:
	See description
>Fix:
	n/a

>Unformatted: