Markus Kilbinger <mk%kilbi.de@localhost> writes:
> Tracking it down (a bit) i've found that simply activating npf without any rule
>
> ntpctl start
>
> 'blocks' a
>
> ping6 -s 2048 testhost
>
> which worked w/o npf aktivated flawlessly.
> BTW: ipv4 fragmented packets seems to be handled correctly under npf
> ('ping -s 2048' works).
> This happens under HEAD and netbsd-7.
>
> Is this a known limitation of npf? Or a bug?
> Send-pr?
If it's not documented in the man page, sure, file a PR.
Actually, even if documented, a PR is in order...
Attachment:
pgpQ66xAZiPje.pgp
Description: PGP signature