From owner-svn-src-all@FreeBSD.ORG Sat Jan 9 19:16:28 2010 Return-Path: Delivered-To: svn-src-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 2C9451065672; Sat, 9 Jan 2010 19:16:28 +0000 (UTC) (envelope-from ume@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:4f8:fff6::2c]) by mx1.freebsd.org (Postfix) with ESMTP id 1CF838FC16; Sat, 9 Jan 2010 19:16:28 +0000 (UTC) Received: from svn.freebsd.org (localhost [127.0.0.1]) by svn.freebsd.org (8.14.3/8.14.3) with ESMTP id o09JGSjA091327; Sat, 9 Jan 2010 19:16:28 GMT (envelope-from ume@svn.freebsd.org) Received: (from ume@localhost) by svn.freebsd.org (8.14.3/8.14.3/Submit) id o09JGRwd091325; Sat, 9 Jan 2010 19:16:27 GMT (envelope-from ume@svn.freebsd.org) Message-Id: <201001091916.o09JGRwd091325@svn.freebsd.org> From: Hajimu UMEMOTO Date: Sat, 9 Jan 2010 19:16:27 +0000 (UTC) To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org X-SVN-Group: head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Cc: Subject: svn commit: r201930 - head/etc X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 09 Jan 2010 19:16:28 -0000 Author: ume Date: Sat Jan 9 19:16:27 2010 New Revision: 201930 URL: http://svn.freebsd.org/changeset/base/201930 Log: The client type rule allows DHCP, implicitly. Since DHCPv6 uses link-local address unlike with DHCP, we need one more rule to allow the DHCPv6. Reported by: David Horn Modified: head/etc/rc.firewall Modified: head/etc/rc.firewall ============================================================================== --- head/etc/rc.firewall Sat Jan 9 19:13:56 2010 (r201929) +++ head/etc/rc.firewall Sat Jan 9 19:16:27 2010 (r201930) @@ -220,6 +220,8 @@ case ${firewall_type} in # Allow any link-local multicast traffic ${fwcmd} add pass all from fe80::/10 to ff02::/16 ${fwcmd} add pass all from ${net6} to ff02::/16 + # Allow DHCPv6 + ${fwcmd} add pass udp from fe80::/10 to me6 546 fi # Allow TCP through if setup succeeded