Re: IPv6 routing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





On 30/08/10 11:43, Jan Engelhardt wrote:
On Monday 2010-08-30 12:37, Jonathan Tripathy wrote:
06:29:37.241590 IP6 2001:470:1f09:dc5::1> ff02::1:ff00:2: ICMP6, neighbor
solicitation, who has 2001:470:1f09:dc5::2, length 32
06:29:37.241800 IP6 2001:470:1f09:dc5::2>  2001:470:1f09:dc5::1: ICMP6,
neighbor advertisement, tgt is 2001:470:1f09:dc5::2, length 32

It seems like netfilter isn't marking the advertisements as "related" to the solicitation request. I think that this is becuase the request was sent to
ff02::1:ff00:2, but the reply came from 2001:470:1f09:dc5::2.
advertisements need not strictly be a reply to a solicit.

So how would I go about adding rules then that allows this?

Ok everyone, I think I found the answer. Just allow -p icmpv6

Does that sound safe enough?

On a side note: netfilter currently has arptables to stop arp cache poisoning. Is there any similar thing for NDP poisoning? I can prevent the actual flow of non-icmpv6 IP traffic to a host by using ip6tables on my bridge device (which sits in the middle of all hosts), however this won't stop DOS attacks..

Cheers
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux