Date: Thu, 26 Jul 2012 10:34:42 -0700 From: Doug Barton <dougb@FreeBSD.org> To: freebsd-net@FreeBSD.org Subject: Fwd: Re: [ipv6hackers] funny FreeBSD bug Message-ID: <50117FB2.1060306@FreeBSD.org> In-Reply-To: <50117DB0.7010909@mh-sec.de> References: <50117DB0.7010909@mh-sec.de>
next in thread | previous in thread | raw e-mail | index | archive | help
FYI, this conversation is happening in the list below. I have no opinion regarding whether it is a bug or not, but I thought folks here might be interested. Doug -------- Original Message -------- Subject: Re: [ipv6hackers] funny FreeBSD bug Date: Thu, 26 Jul 2012 19:26:08 +0200 From: Marc Heuse <mh@mh-sec.de> Reply-To: IPv6 Hackers Mailing List <ipv6hackers@lists.si6networks.com> To: IPv6 Hackers Mailing List <ipv6hackers@lists.si6networks.com>, Simon Perreault <simon.perreault@viagenie.ca> Hi Simon, Am 26.07.2012 17:47, schrieb Simon Perreault: > Le 2012-07-26 08:35, Marc Heuse a écrit : >> I found a funny bug in freebsd (9.0 with all updates): >> if you send an ICMP toobig message to it with a too low MTU size, >> FreeBSD will prepend any packet data with an one-shot fragment (or >> atomic fragment as Fernando calls it). > > Why do you think it's a bug? first it servs no use to add the fragmentation header if the packet is not fragmented. second I have not seen this behaviour in other OS, however I havent looked for it though. > Seems like normal IPv6 behaviour to me. It's in the RFC... I cant remember having seen this in any rfc - do you have a pointer? Greets, Marc -- Marc Heuse www.mh-sec.de PGP: FEDD 5B50 C087 F8DF 5CB9 876F 7FDD E533 BF4F 891A _______________________________________________ Ipv6hackers mailing list Ipv6hackers@lists.si6networks.com http://lists.si6networks.com/listinfo/ipv6hackers
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?50117FB2.1060306>