summaryrefslogtreecommitdiff
path: root/sys/netinet6/ip6_input.c
diff options
context:
space:
mode:
authorMartin Pieuchot <mpi@cvs.openbsd.org>2015-02-05 01:10:58 +0000
committerMartin Pieuchot <mpi@cvs.openbsd.org>2015-02-05 01:10:58 +0000
commit9c617e3758be2054d11f2412c3a489e3281f74bd (patch)
treee59bd77e422182832c1beb48e499ead97d9ba186 /sys/netinet6/ip6_input.c
parent4d73dee4aabd2b00728ba212fd59df611497560a (diff)
Make sure pf(4) does not see embedded scopes.
Packets destinated to link-local addresses are looped back with embedded scopes because we cannot restore them using the receiving interface (lo0). Embedded scopes are needed by the routing table to match RTF_LOCAL routes, but pf(4) never saw them and existing rules are likely to break without teaching the rule engine about them, found by dlg@ the hard way. So save and restore embedded scopes around pf_test() for packets going through loopback. ok dlg@, mikeb@
Diffstat (limited to 'sys/netinet6/ip6_input.c')
-rw-r--r--sys/netinet6/ip6_input.c38
1 files changed, 35 insertions, 3 deletions
diff --git a/sys/netinet6/ip6_input.c b/sys/netinet6/ip6_input.c
index 4efcb5e08cf..a386594843c 100644
--- a/sys/netinet6/ip6_input.c
+++ b/sys/netinet6/ip6_input.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ip6_input.c,v 1.135 2015/01/19 13:53:55 mpi Exp $ */
+/* $OpenBSD: ip6_input.c,v 1.136 2015/02/05 01:10:57 mpi Exp $ */
/* $KAME: ip6_input.c,v 1.188 2001/03/29 05:34:31 itojun Exp $ */
/*
@@ -190,8 +190,8 @@ ip6_input(struct mbuf *m)
struct ifnet *ifp;
struct ip6_hdr *ip6;
int off, nest;
- u_int32_t plen;
- u_int32_t rtalert = ~0;
+ u_int16_t src_scope, dst_scope;
+ u_int32_t plen, rtalert = ~0;
int nxt, ours = 0;
struct ifnet *deliverifp = NULL;
#if NPF > 0
@@ -324,6 +324,22 @@ ip6_input(struct mbuf *m)
* can be destinated to any local address, not necessarily to
* an address configured on `ifp'.
*/
+ if (ifp->if_flags & IFF_LOOPBACK) {
+ if (IN6_IS_SCOPE_EMBED(&ip6->ip6_src)) {
+ src_scope = ip6->ip6_src.s6_addr16[1];
+ ip6->ip6_src.s6_addr16[1] = 0;
+ }
+ if (IN6_IS_SCOPE_EMBED(&ip6->ip6_dst)) {
+ dst_scope = ip6->ip6_dst.s6_addr16[1];
+ ip6->ip6_dst.s6_addr16[1] = 0;
+ }
+ }
+
+ /*
+ * If the packet has been received on a loopback interface it
+ * can be destinated to any local address, not necessarily to
+ * an address configured on `ifp'.
+ */
if ((ifp->if_flags & IFF_LOOPBACK) == 0) {
if (IN6_IS_SCOPE_EMBED(&ip6->ip6_src))
ip6->ip6_src.s6_addr16[1] = htons(ifp->if_index);
@@ -346,6 +362,22 @@ ip6_input(struct mbuf *m)
#endif
/*
+ * Without embedded scope ID we cannot find link-local
+ * addresses in the routing table.
+ */
+ if (ifp->if_flags & IFF_LOOPBACK) {
+ if (IN6_IS_SCOPE_EMBED(&ip6->ip6_src))
+ ip6->ip6_src.s6_addr16[1] = src_scope;
+ if (IN6_IS_SCOPE_EMBED(&ip6->ip6_dst))
+ ip6->ip6_dst.s6_addr16[1] = dst_scope;
+ } else {
+ if (IN6_IS_SCOPE_EMBED(&ip6->ip6_src))
+ ip6->ip6_src.s6_addr16[1] = htons(ifp->if_index);
+ if (IN6_IS_SCOPE_EMBED(&ip6->ip6_dst))
+ ip6->ip6_dst.s6_addr16[1] = htons(ifp->if_index);
+ }
+
+ /*
* Be more secure than RFC5095 and scan for type 0 routing headers.
* If pf has already scanned the header chain, do not do it twice.
*/