Re: [PATCH 2/2] netfilter: IPv6: fix DSCP mangle code

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2011-06-06 at 21:15 -0700, Maciej Åenczykowski wrote:
> I'm still opposed on the grounds that there may be people relying on
> the current behaviour.

That is not my call, but I can tell you that I wrote this patch in
response to a report from several carriers that were complaining that
Linux' mangling code was completely broken and unusable.

>From my experience, we are in a situation where people used to IPv4's
mangling code are starting to migrate to IPv6 only to find out that some
of their iptables rules do not work as expected, the reason (unknown to
them) being that IPv6's DSCP mangling code was not implemented according
to the documentation.

I would think that the benefit of fixing this outweighs the risk of
breaking some systems relying on the current behavior, which is the
opposite of what the documentation says and what its IPv4 counterpart
does.

> This should not make it into the stable series of kernels.
> I can understand fixing it for a future upstream release.

At the very least,

[PATCH 1/2] netfilter: IPv6: initialize TOS field in REJECT target module

is needed (of course, I would like to have 2/2 patch applied too).
Without this patch the TOS field of IPv6 packets generated by the REJECT
target module is random.

- Fernando

--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux