From owner-freebsd-bugs@freebsd.org Fri Dec 25 01:57:53 2020 Return-Path: Delivered-To: freebsd-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 256AE4B2B99 for ; Fri, 25 Dec 2020 01:57:53 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4D297j0PQ6z3t7N for ; Fri, 25 Dec 2020 01:57:53 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 0DC294B2B98; Fri, 25 Dec 2020 01:57:53 +0000 (UTC) Delivered-To: bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0D87D4B2B97 for ; Fri, 25 Dec 2020 01:57:53 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4D297h6s4Lz3tRZ for ; Fri, 25 Dec 2020 01:57:52 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id DE59F1AE2C for ; Fri, 25 Dec 2020 01:57:52 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 0BP1vq3I000474 for ; Fri, 25 Dec 2020 01:57:52 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 0BP1vqsx000473 for bugs@FreeBSD.org; Fri, 25 Dec 2020 01:57:52 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 252121] [patch] rtadvd should not put an upper limit on rdnssltime and dnsslltime Date: Fri, 25 Dec 2020 01:57:52 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bin X-Bugzilla-Version: 12.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: ta0kira@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Dec 2020 01:57:53 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D252121 Bug ID: 252121 Summary: [patch] rtadvd should not put an upper limit on rdnssltime and dnsslltime Product: Base System Version: 12.2-RELEASE Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: bin Assignee: bugs@FreeBSD.org Reporter: ta0kira@gmail.com Created attachment 220903 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D220903&action= =3Dedit Removes upper limit on RDNSS and DNSSL lifetimes. rtadvd (in config.c) limits both rdnssltime and dnsslltime to 2*maxinterval= . If this limit is exceeded, rtadvd completely discards the corresponding rdnss = or dnssl and sends router advertisements without it. This means that sending R= As every 15s places an upper limit on rdnssltime of 30s. Specifically, this short lifetime seems to prevent Android 11 (maybe others) from accepting the RDNSS option. (It's unclear what its minimum is, but 600s seems to be fine.) I've attached a patch to effectively remove the upper limits. To make it minimally intrusive, I just set the upper limit to USHRT_MAX. (Potentially making it 32-bit would be a separate issue.) Note that RFC 8106 (https://tools.ietf.org/html/rfc8106) recommends a defau= lt value of 3*maxinterval for both parameters, and doesn't mention any sort of upper limit. --=20 You are receiving this mail because: You are the assignee for the bug.=