Date: Sun, 28 Sep 1997 13:04:51 +1000 (EST) From: Ada T Lim <ada@not-enough.bandwidth.org> To: FreeBSD-gnats-submit@FreeBSD.ORG Subject: kern/4642: Treatment of unknown IP options breaks rfc2113 Message-ID: <199709280304.NAA02872@polya.blah.org> Resent-Message-ID: <199709280310.UAA01863@hub.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 4642
>Category: kern
>Synopsis: Treatment of unknown IP options breaks rfc2113
>Confidential: yes
>Severity: serious
>Priority: medium
>Responsible: freebsd-bugs
>State: open
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Sat Sep 27 20:10:00 PDT 1997
>Last-Modified:
>Originator: Ada Lim
>Organization:
>Release: FreeBSD 2.2-STABLE i386
>Environment:
>Description:
RFC 2113 (Router Alert Option) states:
2.2 Semantics
Hosts shall ignore this option. Routers that do not recognize this
option shall ignore it. Routers that recognize this option shall
ip_input.c:
[check options]
default:
goto bad;
.
.
.
bad:
ip->ip_len -= IP_VHL_HL(ip->ip_vhl) << 2; /* XXX icmp_error adds in hd
r length */
icmp_error(m, type, code, 0, 0);
ipstat.ips_badoptions++;
return (1);
This also breaks the handling of any new, experimental IP options as they
occur.
What would be preferable is to just allow default to fall-through and silently
ignore any unknown options.
>How-To-Repeat:
>Fix:
Remove the goto bad; :)
>Audit-Trail:
>Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199709280304.NAA02872>
