From owner-freebsd-net@FreeBSD.ORG Wed Apr 20 12:36:58 2011 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 7F2E3106566B; Wed, 20 Apr 2011 12:36:58 +0000 (UTC) (envelope-from lev@FreeBSD.org) Received: from onlyone.friendlyhosting.spb.ru (onlyone.friendlyhosting.spb.ru [IPv6:2a01:4f8:131:60a2::2]) by mx1.freebsd.org (Postfix) with ESMTP id 1DD648FC1C; Wed, 20 Apr 2011 12:36:58 +0000 (UTC) Received: from lion.home.serebryakov.spb.ru (89.112.15.178.pppoe.eltel.net [89.112.15.178]) (Authenticated sender: lev@serebryakov.spb.ru) by onlyone.friendlyhosting.spb.ru (Postfix) with ESMTPA id 81DC84AC42; Wed, 20 Apr 2011 16:36:56 +0400 (MSD) Date: Wed, 20 Apr 2011 16:36:55 +0400 From: Lev Serebryakov Organization: FreeBSD X-Priority: 3 (Normal) Message-ID: <1117238404.20110420163655@serebryakov.spb.ru> To: bug-followup@FreeBSD.org, seh-10lzx4@mail.quadrizen.com MIME-Version: 1.0 Content-Type: text/plain; charset=windows-1251 Content-Transfer-Encoding: quoted-printable Cc: freebsd-ipfw@FreeBSD.org, freebsd-net@freebsd.org Subject: Re: bin/104921: [patch] ipfw(8) sometimes treats ipv6 input as ipv4 (another variation on PR 91245) X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: lev@FreeBSD.org List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 20 Apr 2011 12:36:58 -0000 Hello, Bug-followup. It is still valid for 8.2-STABLE: gateway# ipfw add 50000 allow ipv6-icmp from any to 2001:470:1f09:hhhh::/64= ,2001:470:hhhh:1::/64,2001:470:hhhh:2::/64 icmp6types 1,2,3,4,128,129 keep-= state ipfw: bad netmask ``470:1f09:hhhh::/64'' gateway# uname -a FreeBSD gateway.home.serebryakov.spb.ru 8.2-STABLE FreeBSD 8.2-STABLE #0: F= ri Apr 15 16:57:44 MSD 2011 lev@vmware-8-32.home.serebryakov.spb.ru:/us= r/obj/nanobsd.gateway-net5501/usr/src/sys/NET5501 i386 It is very annoying bug, because "allow" rule can be divided into one-rule-per-network, but "deny ... NOT IPv6,IPv6,..." is hard to emulate (with multiple skipto rules). --=20 // Black Lion AKA Lev Serebryakov