Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Jul 2012 10:34:42 -0700
From:      Doug Barton <dougb@FreeBSD.org>
To:        freebsd-net@FreeBSD.org
Subject:   Fwd: Re: [ipv6hackers] funny FreeBSD bug
Message-ID:  <50117FB2.1060306@FreeBSD.org>
In-Reply-To: <50117DB0.7010909@mh-sec.de>
References:  <50117DB0.7010909@mh-sec.de>

next in thread | previous in thread | raw e-mail | index | archive | help
FYI, this conversation is happening in the list below. I have no opinion
regarding whether it is a bug or not, but I thought folks here might be
interested.

Doug


-------- Original Message --------
Subject: Re: [ipv6hackers] funny FreeBSD bug
Date: Thu, 26 Jul 2012 19:26:08 +0200
From: Marc Heuse <mh@mh-sec.de>
Reply-To: IPv6 Hackers Mailing List <ipv6hackers@lists.si6networks.com>
To: IPv6 Hackers Mailing List <ipv6hackers@lists.si6networks.com>,
Simon Perreault <simon.perreault@viagenie.ca>

Hi Simon,

Am 26.07.2012 17:47, schrieb Simon Perreault:
> Le 2012-07-26 08:35, Marc Heuse a écrit :
>> I found a funny bug in freebsd (9.0 with all updates):
>> if you send an ICMP toobig message to it with a too low MTU size,
>> FreeBSD will prepend any packet data with an one-shot fragment (or
>> atomic fragment as Fernando calls it).
> 
> Why do you think it's a bug? 

first it servs no use to add the fragmentation header if the packet is
not fragmented. second I have not seen this behaviour in other OS,
however I havent looked for it though.

> Seems like normal IPv6 behaviour to me. It's in the RFC...
I cant remember having seen this in any rfc - do you have a pointer?

Greets,
Marc

--
Marc Heuse
www.mh-sec.de

PGP: FEDD 5B50 C087 F8DF 5CB9  876F 7FDD E533 BF4F 891A
_______________________________________________
Ipv6hackers mailing list
Ipv6hackers@lists.si6networks.com
http://lists.si6networks.com/listinfo/ipv6hackers





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?50117FB2.1060306>