Re: IPv6 hop-by-hop check in parallel

2022-08-16 Thread Fernando Gont
regular case, it's only of use for MLD-snooping switches. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar PGP Fingerprint: 7F7F 686D 8AC9 3319 EEAD C1C8 D1D5 4B94 E301 6F01

slacd(8): Implement RFC 8981 (revised RFC 4941, IPv6 Temporary Address Extensions) (revised patch)

2021-03-03 Thread Fernando Gont
This revised patch adresses a minor issue pointed out by Florian (avoid floating-point math). At this point this is unnecessary, since the IPv6 temporary address lifetimes are not configurable. P.S.: Patch also available at: https://www.gont.com.ar/files/fgont-patch-rfc8981-v0.3.diff Thanks, Fern

slacd(8): Implement RFC 8981 (revised RFC 4941, IPv6 Temporary Address Extensions)

2021-03-03 Thread Fernando Gont
Folks, Attached you'll find a patch for slaacd(8) that implements RFC 8981 (a revision of RFC 4941, IPv6 Temporary Address Extensions), just published. slacd(8) had most of it already. The remaining bit was to have each temporary address employ a randomized Preferred Lifetime. I've also found

Re: PATCH: rad(8) Better PIO default lifetimes

2020-04-02 Thread Fernando Gont
. Thoughts from people who are actually running this? Oh, and we need to update the manpage. p.s.: And I see that tab vs. space is still messed up in the defines even after I tried to fix it :/ Maybe I should just let that part go I can try clean that up and update the manpage if that help

PATCH: rad(8) Better PIO default lifetimes (was: Re: Improve handling of IPv6 SLAAC renumbering scenarios)

2020-03-27 Thread Fernando Gont
DNS_LIFETIME 600 * 1.5 - +#defineDFLT_VLTIME_MULT48 +#defineDEFAULT_PIO_PLTIME 1800 +#defineDEFAULT_PIO_VLTIME 1800 * DFLT_VLTIME_MULT #define IMSG_DATA_SIZE(imsg) ((imsg).hdr.len - IMSG_HEADER_SIZE) enum { cut here

Re: slaacd: Reduce maximum IPv6 PIO lifetimes

2020-03-27 Thread Fernando Gont
dy accepted the problem statement I-D: https://tools.ietf.org/html/draft-ietf-v6ops-slaac-renum-01 The problem can even happen accidentally if you e.g. configure rad(8), realize that made a typo, kill the daemon, change the config, and restart the daemon. -- the old prefix would live there for a lng t

Re: PATCH: More apprrpriate vltime for IPv6 temp addrs (rfc4941bis)

2020-03-27 Thread Fernando Gont
/* 2 days */ > +#define ND6_PRIV_PREFERRED_LIFETIME 86400 /* 1 day */ Maybe these should be in engine.h as opposed to engine.c? -- although I see there are other #define's in engine.c Thanks! Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F

PATCH: More apprrpriate vltime for IPv6 temp addrs (rfc4941bis)

2020-03-27 Thread Fernando Gont
ine ND6_PRIV_PREFERRED_LIFETIME86400 /* 1 day */ #ifdef _KERNEL cut here P.S.: Patch also available at: https://www.gont.com.ar/code/patch-fgont-tempaddr-vltime.txt Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D

slaacd: Reduce maximum IPv6 PIO lifetimes

2020-03-23 Thread Fernando Gont
sg).hdr.len - IMSG_HEADER_SIZE) +#define DFLT_VLTIME_MULT 48 + static const char * const log_procnames[] = { "main", "engine", cut here Also available at: https://www.gont.com.ar/code/patch-fgont-slaacd-max-lifetimes.txt Thanks, -- Fernando Go

Improve handling of IPv6 SLAAC renumbering scenarios

2020-03-14 Thread Fernando Gont
efineMIN_RTR_ADV_INTERVAL200 #defineMAX_SEARCH 1025 /* same as MAXDNAME in arpa/nameser.h */ #defineDEFAULT_RDNS_LIFETIME 600 * 1.5 - +#defineDEFAULT_PIO_PLTIME 1800 +#defineDEFAULT_PIO_VLTIME 1800 * 48 #define IMSG_DATA_SIZE(imsg) ((imsg).hdr.len - IMSG_HEADER_SIZE) enum { cut here -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: slaacd(8) improve movement between IPv6 & legacy-IP-only networks

2020-01-22 Thread Fernando Gont
Hello, Florian, Apologies for the delay in my response. I was mostly off-line for the last ten days or so. Inn-line On 10/1/20 03:56, Florian Obser wrote: Hi Fernando, On Thu, Jan 09, 2020 at 08:49:15AM -0300, Fernando Gont wrote: Hi, Pamela, [] Just happened to see this (sorry

Re: slaacd(8) improve movement between IPv6 & legacy-IP-only networks

2020-01-09 Thread Fernando Gont
dresses being removed. Otherwise, you might break e.g. existing TCP connections upon transient network problems. Since we are at it: heads-up: https://www.ietf.org/internet-drafts/draft-ietf-6man-rfc4941bis-05.txt Thanks! Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6network

PF support for IPv6 Extension Headers

2015-06-10 Thread Fernando Gont
that contain a Destination Options Header") * Filtering packets base on the EH size * Filtering packets based on the number of EHs they contain (e.g., drop the packet if it employs more than 5 EHs) etc. Thoughts? Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...

Re: sysctl.8: add missing mtudisctimeout for ipv6

2014-04-25 Thread Fernando Gont
6 sysctls not documented... >> >> which ipv6 sysctls are you referring to ? >> > > net.inet6.ip6.neighborgcthresh > net.inet6.ip6.maxifprefixes > net.inet6.ip6.maxifdefrouters > net.inet6.ip6.maxdynroutes > net.inet6.ip6.dad_pending > net.inet6.ip6.mtudisctimeout > > any ip6 bods reading, feel free to help with a sentence or two. Do you still need help with this? Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: IPv6 DoS sysctl man page additions

2014-04-21 Thread Fernando Gont
It net.inet6.ip6.maxifdefrouters Ta integer Ta yes > .It net.inet6.ip6.mforwarding Ta integer Ta yes > .It net.inet6.ip6.multipath Ta integer Ta yes > .It net.inet6.ip6.multicast_mtudisc Ta integer Ta yes > +.It net.inet6.ip6.neighborgcthresh Ta integer Ta yes > .It net.inet6.icmp6.rediraccept Ta integer Ta yes > .It net.inet6.icmp6.redirtimeout Ta integer Ta yes > .It net.inet6.icmp6.nd6_prune Ta integer Ta yes > > -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Update to RFC793's TCP sequence number validation checks

2013-09-20 Thread Fernando Gont
) Internet-Draft before it is adopted as a working group item. If you have a few minutes, please take a look, and post your comments/review to (and make sure to CC me). This will be of much help, and having feedback from the implementers' community would be really valuable. Thanks! Best regards,

Show multicast groups joined?

2013-06-16 Thread Fernando Gont
Folks, What would be the appropriate command to show the IPv6 multicast groups joined by all/each interface? (FWIW, I'm looking for something similar to FreeBSD's "ifmcstat(8)" or Linux's "ip -6 maddr show"). Thanks in advance! -- Fernando Gont

IPv6 Toolkit v1.3.1 released!

2013-02-19 Thread Fernando Gont
our local system. The toolkit runs on (at least) the latest versions of Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. Please send any bug reports and/or feature requests to . And you can stay tunned for updates on our Twitter: @SI6Networks. Thanks! Best regards, - -- Fernan

Re: VPN traffic leaks in IPv6/IPv4 dual-stack networks/hosts

2012-11-23 Thread Fernando Gont
e > suggestion to disable all IPv6 traffic if we have an IPv4-only tunnel. > iked(8) could use a pf anchor to load a block rule, disable > net.inet6.ip6.forwarding, or we could add a knob net.inet6.enable=0 > that doesn't alter the configured routes and addresses and simply >

Re: VPN traffic leaks in IPv6/IPv4 dual-stack networks/hosts

2012-11-23 Thread Fernando Gont
On 11/23/2012 08:44 AM, Henning Brauer wrote: > * Fernando Gont [2012-11-23 12:09]: >> FYI. This is might affect OpenBSD users employing e.g. OpenVPN: >> <http://tools.ietf.org/html/draft-gont-opsec-vpn-leakages>. > > we're way less affected than other OSes, sinc

VPN traffic leaks in IPv6/IPv4 dual-stack networks/hosts

2012-11-23 Thread Fernando Gont
h that e.g. all v6 traffic is filtered (yes, this is certainly not the most desirable fix, but still probably better than having your supposedly-secured traffic being sent in the clear). Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322

Re: Bringing some sanity to IPv6 traffic (IETF Internet-Drafts)

2012-10-23 Thread Fernando Gont
omeone can help a bit, i can dig further :-) Where does the above code check whether the entire IPv6 header chain is present in the first fragment? Cheers, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Bringing some sanity to IPv6 traffic (IETF Internet-Drafts)

2012-10-15 Thread Fernando Gont
Folks, FYI: * <http://tools.ietf.org/id/draft-ietf-6man-oversized-header-chain-01.txt> * <http://tools.ietf.org/id/draft-ietf-6man-nd-extension-headers-00.txt> P.S.: These two have already been adopted by the 6man wg, and are close to publication as RFCs. Cheers, -- Fernando

IPv6 stable privacy addresses (Fwd: I-D Action: draft-ietf-6man-stable-privacy-addresses-01.txt)

2012-10-09 Thread Fernando Gont
od for Generating Stable Privacy-Enhanced Addresses with IPv6 Stateless Address Autoconfiguration (SLAAC) Author(s) : Fernando Gont Filename: draft-ietf-6man-stable-privacy-addresses-01.txt Pages : 17 Date: 2012-10-07 Abstract:

IPv6 toolkit v1.2

2012-07-15 Thread Fernando Gont
implementations (such as predictability of Fragment ID values), etc. It can also be employed to play with IPv6 address resolution, SLAAC, etc. Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: Setting the IPv6 Flow Label for TCP connections

2012-02-17 Thread Fernando Gont
se for TCCLASS, > I had fixed the TOS for ipv4 and I had an untested diff for ipv6. The > thing is No. The IPv6 traffic class is similar ot the IPv4 *ToS*. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Setting the IPv6 Flow Label for TCP connections

2012-02-15 Thread Fernando Gont
generation function (as you need to remember the FL you used for the SYN/ACK, since the FL is supposed to remain constant during the life of the connection). Might be able to produce a patch in a couple of weeks, but mentioned it in the event anyone else finds some cycles before I do. Thanks, -- Fernando

Re: overlapping IPv6 fragments in pf

2012-01-13 Thread Fernando Gont
On 01/13/2012 12:11 PM, Alexander Bluhm wrote: > On Fri, Jan 13, 2012 at 11:01:43AM -0300, Fernando Gont wrote: >> On 01/12/2012 04:04 PM, Alexander Bluhm wrote: >>> I have reconsidered it and drop the fragments immediately. The >>> packet to be reassembled wi

Re: overlapping IPv6 fragments in pf

2012-01-13 Thread Fernando Gont
r that packet. If there were more fragment coming, they will be kept in the fragment reassembly queue until a reassembly timeout. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: overlapping IPv6 fragments in pf

2012-01-13 Thread Fernando Gont
fragment fields while there. > - If the fr_queue is empty, we had overlapping fragments, don't add > new ones. Not sure what this means. P.S.: Will try your patch this weekend. Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Finger

Re: handle overlapping IPv6 fragments

2012-01-12 Thread Fernando Gont
On 01/11/2012 12:16 AM, Alexander Bluhm wrote: > On Tue, Jan 10, 2012 at 07:51:03PM -0300, Fernando Gont wrote: >> On 01/10/2012 01:20 PM, Alexander Bluhm wrote: >>> Implement RFC 5722 and drop all IPv6 fragments that belong to a >>> packet with overlapping fragme

Re: overlapping IPv6 fragments in pf

2012-01-12 Thread Fernando Gont
receive them. Since there's no legitimate reason of overlapping fragments, get rid of them asap. And if there were more fragments (for the same packet) coming, they will be dropped as a result of the reassembly timeout. Thanks, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com

select()ing on the underlying descriptor of a pcap_t

2012-01-10 Thread Fernando Gont
p_inject() packets... Thoughts? Thanks! Best regards, -- Fernando Gont e-mail: ferna...@gont.com.ar || fg...@si6networks.com PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1

Re: handle overlapping IPv6 fragments

2012-01-10 Thread Fernando Gont
On 01/10/2012 01:20 PM, Alexander Bluhm wrote: > Implement RFC 5722 and drop all IPv6 fragments that belong to a > packet with overlapping fragments. FWIW, you may be interested in this one, too: http://tools.ietf.org/id/draft-gont-6man-ipv6-atomic-fragments-00.txt Thanks, -- Fernando