Date: Wed, 19 Dec 2001 17:33:13 +0200 From: Ruslan Ermilov <ru@FreeBSD.ORG> To: Yar Tikhiy <yar@FreeBSD.ORG> Cc: net@FreeBSD.ORG, hackers@FreeBSD.ORG Subject: Re: Processing IP options reveals IPSTEALH router Message-ID: <20011219173313.C54315@sunbay.com> In-Reply-To: <20011219181929.A20425@comp.chem.msu.su> References: <20011219181929.A20425@comp.chem.msu.su>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Dec 19, 2001 at 06:19:29PM +0300, Yar Tikhiy wrote: > Hi there, > > I ran into an absolutely clear, but year-old PR pointing out that > a router in the IPSTEALTH mode will reveal itself when processing > IP options: kern/23123. > > The fix proposed seems clean and right to me: don't do IP options > at all when in the IPSTEALTH mode. Does anyone have objections? > If no, I'll commit the fix. > What if the packet is directed to us? I think we should still process options in this case, and the patch in the PR doesn't seem to do it. <PS> I was going to replace IPSTEALTH functionality with the net.inet.ip.decttl knob. Setting it to 0 would match the IPSTEALTH behavior, the default value will be 1. </PS> Cheers, -- Ruslan Ermilov Oracle Developer/DBA, ru@sunbay.com Sunbay Software AG, ru@FreeBSD.org FreeBSD committer, +380.652.512.251 Simferopol, Ukraine http://www.FreeBSD.org The Power To Serve http://www.oracle.com Enabling The Information Age To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011219173313.C54315>