Age | Commit message (Collapse) | Author |
|
the packets with the same maximum size. This allows the sender to
determine the optimal fragment size by Path MTU Discovery.
testing sthen@ matthieu@
ok claudio@
|
|
reassembly code. This makes it possible to reuse them for IPv6.
ok claudio@
|
|
ok dlg@
tested by jono
|
|
patch from Gleydson Soares
ok dlg@
|
|
ok deraadt
|
|
to make it reusable by pf fragment reassembly. No functional change.
discussed with henning@, claudio@, deraadt@, kettenis@
ok guenther@
|
|
and make it void.
ok henning@, markus@, mcbride@
|
|
blindly assuming everything is v4 to be sent with ip_output.
problem originally reported by Marco Fretz.
fix verified locally.
ok henning@ mcbride@
|
|
the protocol.
|
|
problem was reported by babut at yandex dot ru in the pr 6564, tested by
the pr originator and me, ok henning mcbride. shaves off a bunch of XXXs.
|
|
move the configured multicast addresses and preserve the promisc mode
settings of the parent. this fixes an issue when carp stopped working on
a vlan after the vlandev was manually changed.
ok naddy@ phessler@
|
|
|
|
using address ranges (e.g. "10.1.1.1 - 10.1.1.5") did not match addresses
correctly on little-endian systems. ok henning@
|
|
Noticed by robert at openbsd pap st, thanks.
|
|
|
|
leak previous kernel stack contents through a malicioius BPF filter.
Reported by Dan Rosenberg via Alistair Crooks. ok deraadt@, krw@,
claudio@
|
|
IPv4-ICMP6 and IPv6-ICMP packets are not rewritten in case they are
dropped and logged.
spotted by mikeb@; ok henning@
|
|
not do the same check in pf_test_rule() again.
ok henning
|
|
header lenght was uninitialized. This resulted in a panic in
m_clget(). Initialize hdrlen with 0 and call m_copyback() only if
necessary.
ok henning@
|
|
wrong. As an effect small valid fragmented packets got dropped and
some invalid fragmented packets were passed. plen is the payload
lenght of the ipv6 packet without the ipv6 header. off is relative
to the whole packet including the ipv6 header. Add sizeof(struct
ip6_hdr) in the calculation.
ok henning@ markus@
|
|
ok gollo@
|
|
broadcast mode.
ok blambert@ mikeb@
|
|
a possible memory leak with bpf's BIOCSFILDROP option which is currently
used by dhcpd and dhclient.
Found by gollo@
|
|
make sense, not just the family.
from jonathan matthew
ok yasuoka@
|
|
|
|
ok henning@ markus@
|
|
diff from form@ who's too busy drinking vodka with pelmeni to commit this;
ok claudio
|
|
pf_reassemble() to return PF_DROP or PF_PASS and *m0 is NULL or the
reassembled packet. In case of PF_DROP, the mbuf must be valid,
e.g. for logging, and will be freed later. In case the reassembled
packet is too big, use the reassembled mbuf for PF_DROP.
ok henning@ markus@
|
|
- PF_DROP, the packet is bad, the mbuf still exists and must be freed.
- PF_PASS and *m0 is NULL, the packet has been processed, not an error.
- PF_PASS and *m0 is not NULL, continue with packet processing.
This fixes a potential mbuf use after free.
ok henning@ markus@ mpf@
|
|
copied the pointer to the sockaddr instead of the content of
sockaddr_in. As the source of the data resides on the stack, the
pointer got invalid later and the kernel crashed. As only addresses
with fixed size are used, sa_len bytes of the sockaddr can be
coppied.
ok krw@ markus@ mpf@ claudio@ henning@
|
|
passphrase or an RSA key) in the reply message. There's
nothing that justifies this behavior and PF_KEY RFC prefers
to exclude keys and other sensitive material from replies.
Discussed with reyk, no objections from deraadt.
|
|
explicit_bzero() where required
ok markus mikeb
|
|
ok claudio henning dlg miod
|
|
varies by arch). the 20ms is still up for discussion.
ok deraadt@
|
|
could be used multiple times for different packets. This happened
when pflow(4) was used. Instead of a global variable, store the
pf_headers in a local variable on the stack.
david@ found the bug, narrowed it down and tested the fix.
ok henning@
|
|
string.
ok henning dlg claudio
|
|
rtfree(rt). Without this the sp_protocol on RTM_DELETE is garbage
and rtsocket user that restrict the AF of the socket (like ospfd)
will not see a single one of the RTM_DELETE.
OK henning@, dlg@
|
|
|
|
consistent with the network stack.
ok mcbride@ henning@
|
|
Fix for rev 1.37 commit which would crash when slip(4) is used.
Problem found the hard way by Henri Kemppainen.
|
|
misleading comment that did nothing.
ok henning@ jsing@
|
|
size_t to int truncation
ok claudio
|
|
runtime instead of forcing the user to-recreate the interface with the
changed options. The code now re-configures the interface instead of
returning EBUSY. For example, it is now possible to run "ifconfig
vlan1 vlandev em0; ifconfig vlan1 vlandev em1" in a sequence.
ok claudio@ deraadt@
|
|
from fragment crop. PFFRAG_NOBUFFER and PFFRAG_DROP are never set.
pf_cache_pl and pf_cent_pl have no pool_get.
ok henning@
|
|
common function pf_addr_compare().
ok henning@
|
|
tracked down and diff sent by Robert B Mills <rbmills at sdf.lonestar.org>
thanks, very good work! ok claudio
|
|
for it. This makes the netisr a real C function which will help further
development. No noticable performance change on i386 and amd64.
With input from kettenis@ and miod@ additional OKs mikeb@ and henning@
|
|
All pointers in the struct need to be cleared and reset. So instead of
bcopy the struct and clear some fields start with a clean struct and
assign the values that need to be copied.
Fixes a local vulnerability but only root can issue the problematic ioctl().
Reported by Jean Sigwald, has been in snaps for a while and OK deraadt@
|
|
ok henning@
|
|
platforms.
|