mirror of
https://github.com/openbsd/src.git
synced 2025-01-10 06:47:55 -08:00
During boot we have a protective and restrictive pf ruleset during the time
we are running netstart, and then load the pf.conf ruleset after all of the interfaces are loaded. Allow in and out IPv6 neighbor advertisement traffic without state during that time. suggestions/OK from saschan@ OK sthen@ kn@ florian@ deraadt@
This commit is contained in:
parent
4fc1a5885d
commit
6fcd0d88b6
4
etc/rc
4
etc/rc
@ -1,4 +1,4 @@
|
||||
# $OpenBSD: rc,v 1.570 2023/01/25 10:53:15 asou Exp $
|
||||
# $OpenBSD: rc,v 1.571 2023/04/26 14:28:09 phessler Exp $
|
||||
|
||||
# System startup script run by init on autoboot or after single-user.
|
||||
# Output and error are redirected to console by init, and the console is the
|
||||
@ -447,7 +447,7 @@ if [[ $pf != NO ]]; then
|
||||
if ifconfig lo0 inet6 >/dev/null 2>&1; then
|
||||
RULES="$RULES
|
||||
pass out inet6 proto icmp6 all icmp6-type neighbrsol
|
||||
pass in inet6 proto icmp6 all icmp6-type neighbradv
|
||||
pass inet6 proto icmp6 all icmp6-type neighbradv no state
|
||||
pass out inet6 proto icmp6 all icmp6-type routersol
|
||||
pass in inet6 proto icmp6 all icmp6-type routeradv
|
||||
pass out inet6 proto udp from any port dhcpv6-client to any port dhcpv6-server
|
||||
|
Loading…
Reference in New Issue
Block a user