Subject: kern/11082: Enabling ipf(4) breaks IPv6
To: None <gnats-bugs@gnats.netbsd.org>
From: Matthias Scheler <tron@lyssa.zhadum.de>
List: netbsd-bugs
Date: 09/25/2000 13:30:26
>Number: 11082
>Category: kern
>Synopsis: Enabling ipf(4) breaks IPv6
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: kern-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Mon Sep 25 13:36:00 PDT 2000
>Closed-Date:
>Last-Modified:
>Originator: Matthias Scheler
>Release: 1.5_ALPHA2 2000/09/24
>Organization:
Matthias Scheler http://core.de/~tron/
>Environment:
NetBSD xena.zhadum.de 1.5_ALPHA2 NetBSD 1.5_ALPHA2 (XENA) #0: Sun Sep 24 23:41:01 CEST 2000 tron@xena.zhadum.de:/src/sys/compile/XENA arm32
>Description:
After ipf(4) has been enabled - the default policy is *not* to block,
a short pass all "/etc/ipf.conf" is loaded - IPv6 connectify doesn't
work any more. As a result e.g. "rtsol" fails completely:
tron@xena:~#rtsol cs0
sendmsg on cs0: No route to host
sendmsg on cs0: No route to host
sendmsg on cs0: No route to host
IPv4 connectivity still works fine. "rtsol" works fine after ipf(4)
has been disabled
>How-To-Repeat:
ipf -E -F
rtsol cs0
>Fix:
Sorry, I don't know.
>Release-Note:
>Audit-Trail:
>Unformatted: