Re: [PATCH net-next v2] net: ipv6: make sure multicast packets are not forwarded beyond the different scopes

2017-05-03 Thread Donatas Abraitis
return 0; } On Tue, May 2, 2017 at 9:59 PM, David Miller wrote: > From: Donatas Abraitis > Date: Thu, 27 Apr 2017 10:12:02 +0300 > >> RFC4291 2.7 Routers must not forward any multicast packets >> beyond of the scope indicated by the scop f

[PATCH net-next v2] net: ipv6: make sure multicast packets are not forwarded beyond the different scopes

2017-04-27 Thread Donatas Abraitis
RFC4291 2.7 Routers must not forward any multicast packets beyond of the scope indicated by the scop field in the destination multicast address. Signed-off-by: Donatas Abraitis --- net/ipv6/ip6_input.c | 8 1 file changed, 8 insertions(+) diff --git

[PATCH net-next v1] net: ipv6: make sure multicast packets are not forwarded beyond the different scopes

2017-04-26 Thread Donatas Abraitis
RFC4291 2.7 Routers must not forward any multicast packets beyond of the scope indicated by the scop field in the destination multicast address. Signed-off-by: Donatas Abraitis --- net/ipv6/ip6_input.c | 8 1 file changed, 8 insertions(+) diff --git

[PATCH -stable 3.10,backport] net: ipv6: drop non loopback packets claiming to originate from ::1

2017-04-25 Thread Donatas Abraitis
commit 0aa8c13eb512823bc4d60397d666a6b6260bb965 upstream. We lack a saddr check for ::1. This causes security issues e.g. with acls permitting connections from ::1 because of assumption that these originate from local machine. Assuming a source address of ::1 is local seems reasonable. RFC4291 do

tcp_update_metrics() fail fast before declaring variables

2015-08-07 Thread Donatas Abraitis
Hi folks, one short question regarding net.ipv4.tcp_no_metrics_save sysctl parameter. Code snippet is actually the following: void tcp_update_metrics(struct sock *sk) { struct tcp_sock *tp = tcp_sk(sk); struct dst_entry *dst = __sk_dst_get(sk); if (sysctl_tcp_nometrics_save) return; W