diff options
author | Jun-ichiro itojun Hagino <itojun@cvs.openbsd.org> | 2000-03-17 17:40:32 +0000 |
---|---|---|
committer | Jun-ichiro itojun Hagino <itojun@cvs.openbsd.org> | 2000-03-17 17:40:32 +0000 |
commit | 0d74f18c01a10f0b07b2b26263b491bbbc854af9 (patch) | |
tree | f70561768811c83ca488b2393a90efbbc61130f4 /etc | |
parent | c41d00bd099f0cbf9a785b7f700efe38ccee2ecc (diff) |
correct reject route installations for IPv6. improve comments.
Diffstat (limited to 'etc')
-rw-r--r-- | etc/netstart | 41 |
1 files changed, 34 insertions, 7 deletions
diff --git a/etc/netstart b/etc/netstart index 6d982ff3dc8..3f238a559e3 100644 --- a/etc/netstart +++ b/etc/netstart @@ -1,6 +1,6 @@ #!/bin/sh - # -# $OpenBSD: netstart,v 1.65 2000/03/12 04:18:47 itojun Exp $ +# $OpenBSD: netstart,v 1.66 2000/03/17 17:40:31 itojun Exp $ # Returns true if $1 contains only alphanumerics isalphanumeric() { @@ -47,17 +47,44 @@ if ifconfig lo0 inet6 >/dev/null 2>&1; then # IPv6 configurations. ip6kernel=YES - # disallow scoped unicast dest without outgoing scope identifiers. + # disallow link-local unicast dest without outgoing scope identifiers. route add -inet6 fe80:: -prefixlen 10 ::1 -reject - route add -inet6 fc80:: -prefixlen 10 ::1 -reject + + # disallow site-local unicast dest without outgoing scope identifiers.. + # If you configure site-locals without scope id (it is permissible + # config for routers that are not on scope boundary), you may want + # to comment the line out. + route add -inet6 fec0:: -prefixlen 10 ::1 -reject + # disallow "internal" addresses to appear on the wire. route add -inet6 ::ffff:0.0.0.0 -prefixlen 96 ::1 -reject - route add -inet6 ::0.0.0.0 -prefixlen 96 ::1 -reject - # disallow packets to malicious 6to4 prefix + + # disallow packets to malicious IPv4 compatible prefix. + route add -inet6 ::224.0.0.0 -prefixlen 100 ::1 -reject + route add -inet6 ::127.0.0.0 -prefixlen 104 ::1 -reject + route add -inet6 ::0.0.0.0 -prefixlen 104 ::1 -reject + route add -inet6 ::255.0.0.0 -prefixlen 104 ::1 -reject + + # disallow packets to malicious 6to4 prefix. route add -inet6 2002:e000:: -prefixlen 20 ::1 -reject route add -inet6 2002:7f00:: -prefixlen 24 ::1 -reject - route add -inet6 2002:0000:0000:: -prefixlen 48 ::1 -reject - route add -inet6 2002:ffff:ffff:: -prefixlen 48 ::1 -reject + route add -inet6 2002:0000:: -prefixlen 24 ::1 -reject + route add -inet6 2002:ff00:: -prefixlen 24 ::1 -reject + + # Completely disallow packets to IPv4 compatible prefix. + # This may conflict with RFC1933 under following circumstances: + # (1) An IPv6-only KAME node tries to originate packets to IPv4 + # comatible destination. The KAME node has no IPv4 compatible + # support. Under RFC1933, it should transmit native IPv6 + # packets toward IPv4 compatible destination, hoping it would + # reach a router that forwards the packet toward auto-tunnel + # interface. + # (2) An IPv6-only node originates a packet to IPv4 compatible + # destination. A KAME node is acting as an IPv6 router, and + # asked to forward it. + # Due to rare use of IPv4 compatible address, and security issues + # with it, we disable it by default. + route add -inet6 ::0.0.0.0 -prefixlen 96 ::1 -reject rtsolif="" else |