Subject: kern/11082: Enabling ipf(4) breaks IPv6
To: None <gnats-bugs@gnats.netbsd.org>
From: Matthias Scheler <tron@lyssa.zhadum.de>
List: netbsd-bugs
Date: 09/25/2000 13:30:26
>Number:         11082
>Category:       kern
>Synopsis:       Enabling ipf(4) breaks IPv6
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Mon Sep 25 13:36:00 PDT 2000
>Closed-Date:
>Last-Modified:
>Originator:     Matthias Scheler
>Release:        1.5_ALPHA2 2000/09/24
>Organization:
Matthias Scheler                                         http://core.de/~tron/
>Environment:
NetBSD xena.zhadum.de 1.5_ALPHA2 NetBSD 1.5_ALPHA2 (XENA) #0: Sun Sep 24 23:41:01 CEST 2000     tron@xena.zhadum.de:/src/sys/compile/XENA arm32


>Description:
After ipf(4) has been enabled - the default policy is *not* to block,
a short pass all "/etc/ipf.conf" is loaded - IPv6 connectify doesn't
work any more. As a result e.g. "rtsol" fails completely:

tron@xena:~#rtsol cs0
sendmsg on cs0: No route to host
sendmsg on cs0: No route to host
sendmsg on cs0: No route to host

IPv4 connectivity still works fine. "rtsol" works fine after ipf(4)
has been disabled

>How-To-Repeat:
ipf -E -F
rtsol cs0

>Fix:
Sorry, I don't know.
>Release-Note:
>Audit-Trail:
>Unformatted: