From owner-freebsd-bugs Sun Nov 2 19:52:00 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id TAA02607 for bugs-outgoing; Sun, 2 Nov 1997 19:52:00 -0800 (PST) (envelope-from owner-freebsd-bugs) Received: (from fenner@localhost) by hub.freebsd.org (8.8.7/8.8.7) id TAA02584; Sun, 2 Nov 1997 19:51:54 -0800 (PST) (envelope-from fenner) Date: Sun, 2 Nov 1997 19:51:54 -0800 (PST) From: Bill Fenner Message-Id: <199711030351.TAA02584@hub.freebsd.org> To: ada@not-enough.bandwidth.org, fenner, freebsd-bugs Subject: Re: kern/4642 Sender: owner-freebsd-bugs@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk Synopsis: Treatment of unknown IP options breaks rfc2113 State-Changed-From-To: open-closed State-Changed-By: fenner State-Changed-When: Sun Nov 2 19:45:06 PST 1997 State-Changed-Why: The actual code from ip_dooptions which handles unknown options is: default: break; The only place where there's a "default: goto bad;" as described in the PR is a switch inside the IPOPT_TS case, and in that case returning an ICMP parameter problem is correct.