summaryrefslogtreecommitdiff
path: root/sys/netinet6
diff options
context:
space:
mode:
authorAlexander Bluhm <bluhm@cvs.openbsd.org>2017-05-06 16:36:00 +0000
committerAlexander Bluhm <bluhm@cvs.openbsd.org>2017-05-06 16:36:00 +0000
commit4b413c8ce0c6ccc7ff73f45c7e7646547cf028a6 (patch)
tree799468f1ac12f193473819456365ecbf8f2c65b9 /sys/netinet6
parentb2bfa76ccdb4a785f5ed83f61bdb96bb377642ca (diff)
Checking for IPv4 mapped addreses and dropping the packet is done
in ip6_input(). Do not check that again in the protocol input functions. OK mpi@
Diffstat (limited to 'sys/netinet6')
-rw-r--r--sys/netinet6/raw_ip6.c10
1 files changed, 1 insertions, 9 deletions
diff --git a/sys/netinet6/raw_ip6.c b/sys/netinet6/raw_ip6.c
index e5217b2791b..c91d971257d 100644
--- a/sys/netinet6/raw_ip6.c
+++ b/sys/netinet6/raw_ip6.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: raw_ip6.c,v 1.111 2017/04/19 15:44:45 bluhm Exp $ */
+/* $OpenBSD: raw_ip6.c,v 1.112 2017/05/06 16:35:59 bluhm Exp $ */
/* $KAME: raw_ip6.c,v 1.69 2001/03/04 15:55:44 itojun Exp $ */
/*
@@ -130,14 +130,6 @@ rip6_input(struct mbuf **mp, int *offp, int proto, int af)
if (proto != IPPROTO_ICMPV6)
rip6stat_inc(rip6s_ipackets);
- /* Be proactive about malicious use of IPv4 mapped address */
- if (IN6_IS_ADDR_V4MAPPED(&ip6->ip6_src) ||
- IN6_IS_ADDR_V4MAPPED(&ip6->ip6_dst)) {
- /* XXX stat */
- m_freem(m);
- return IPPROTO_DONE;
- }
-
bzero(&rip6src, sizeof(rip6src));
rip6src.sin6_len = sizeof(struct sockaddr_in6);
rip6src.sin6_family = AF_INET6;