History log of /src/sys/netinet6/route6.c |
Revision | | Date | Author | Comments |
1.25 |
| 01-Feb-2018 |
maxv | Remove this code, RH0 must be dropped, according to RFC5095. FreeBSD and OpenBSD already do the same. Also, style, and remove useless includes.
|
1.24 |
| 01-Feb-2018 |
maxv | Fix the ICMP error code. rh was obtained via IP6_EXTHDR_GET, and it is not guaranteed to be in the same mbuf as ip6, so computing the difference between the pointers may result in a wrong offset.
ip6 is now unused, so remove it.
|
1.23 |
| 15-Apr-2008 |
thorpej | branches: 1.23.84; Make ip6 and icmp6 stats per-cpu.
|
1.22 |
| 08-Apr-2008 |
thorpej | Change IPv6 stats from a structure to an array of uint64_t's.
Note: This is ABI-compatible with the old ip6stat structure; old netstat binaries will continue to work properly.
|
1.21 |
| 29-Oct-2007 |
dyoung | branches: 1.21.12; 1.21.16; The IPv6 stack labels incoming packets with an m_tag whose payload is a struct ip6aux. A struct ip6aux used to contain a pointer to an in6_ifaddr, but that pointer could become a dangling reference in the lifetime of the m_tag, because ip6_setdstifaddr() did not increase the in6_ifaddr's reference count. I have removed the pointer from ip6aux. I load it with the interesting fields from the in6_ifaddr (an IPv6 address, a scope ID, and some flags), instead.
|
1.20 |
| 23-May-2007 |
christos | branches: 1.20.6; 1.20.8; 1.20.12; Ansify + add a few comments, from Karl Sjödahl
|
1.19 |
| 17-May-2007 |
yamt | remove net.inet6.ip6.rht0 sysctl. it's too dangerous compared to its benefit.
strongly requested by itojun@. ok'ed by core@.
|
1.18 |
| 22-Apr-2007 |
christos | Disable processing of routing header type 0 packets since they can be used of DoS attacks. Provide a sysctl to re-enable them (net.inet6.ip6.rht0).
Information from: http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf
|
1.17 |
| 04-Mar-2007 |
christos | branches: 1.17.2; 1.17.4; Kill caddr_t; there will be some MI fallout, but it will be fixed shortly.
|
1.16 |
| 16-Nov-2006 |
christos | branches: 1.16.2; 1.16.4; __unused removal on arguments; approved by core.
|
1.15 |
| 12-Oct-2006 |
christos | - sprinkle __unused on function decls. - fix a couple of unused bugs - no more -Wno-unused for i386
|
1.14 |
| 21-Jan-2006 |
rpaulo | branches: 1.14.18; 1.14.20; Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of scope zone IDs and won't touch "s6_addr16[1]" directly. - similarly, most of the kernel code will not care about link-local scoped addresses as a special case. - scope boundary check will be stricter. For example, the current *BSD code allows a packet with src=::1 and dst=(some global IPv6 address) to be sent outside of the node, if the application do: s = socket(AF_INET6); bind(s, "::1"); sendto(s, some_global_IPv6_addr); This is clearly wrong, since ::1 is only meaningful within a single node, but the current implementation of the *BSD kernel cannot reject this attempt. - and, while there, don't try to remove the ff02::/32 interface route entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source address selection algorithm defined in RFC3484, which will be completed on in the future.
From the KAME project via JINMEI Tatuya. Approved by core@.
|
1.13 |
| 06-Jun-2003 |
itojun | branches: 1.13.4; 1.13.8; 1.13.16; 1.13.18; 1.13.24; 1.13.28; 1.13.30; 1.13.32; - sync up MLD declaration with RFC3542 (s/MLD6/MLD/) - routing header declaration with RFC3542 (note: sizeof(ip6_rthdr0) has changed!) also, sync up with RFC2460 routing header definition (no "strict" source routing mode any more)
part of advanced API update (RFC2292 -> 3542).
|
1.12 |
| 14-May-2003 |
itojun | always use PULLDOWN_TEST codepath.
|
1.11 |
| 11-Sep-2002 |
itojun | KNF - return is not a function. sync w/kame.
|
1.10 |
| 13-Nov-2001 |
lukem | add RCSIDs
|
1.9 |
| 16-Oct-2001 |
itojun | more whitespace/comment sync with kame
|
1.8 |
| 10-Feb-2001 |
itojun | branches: 1.8.2; 1.8.4; to sync with kame better, (1) remove register declaration for variables, (2) sync whitespaces, (3) update comments. (4) bring in some of portability and logging enhancements. no functional changes here.
|
1.7 |
| 20-Sep-2000 |
itojun | repair cut-and-paste bug. from: francis dupont. sync with kame
|
1.6 |
| 06-Feb-2000 |
itojun | branches: 1.6.4; fix include pathname for better rfc2292 compliance.
|
1.5 |
| 31-Jan-2000 |
itojun | be proactive about malicious packet on the wire. we fear that v4 mapped address to be used as a tool to hose security filters (like bypassing "local host only" filter by using ::ffff:127.0.0.1).
|
1.4 |
| 13-Dec-1999 |
itojun | sync IPv6 part with latest KAME tree. IPsec part is left unmodified due to massive changes in KAME side. - IPv6 output goes through nd6_output - faith can capture IPv4 packets as well - you can run IPv4-to-IPv6 translator using heavily modified DNS servers - per-interface statistics (required for IPv6 MIB) - interface autoconfig is revisited - udp input handling has a big change for mapped address support. - introduce in4_cksum() for non-overwriting checksumming - introduce m_pulldown() - neighbor discovery cleanups/improvements - netinet/in.h strictly conforms to RFC2553 (no extra defs visible to userland) - IFA_STATS is fixed a bit (not tested) - and more more more.
TODO: - cleanup os-independency #ifdef - avoid rcvif dual use (for IPsec) to help ifdetach
(sorry for jumbo commit, I can't separate this any more...)
|
1.3 |
| 03-Jul-1999 |
thorpej | branches: 1.3.2; 1.3.8; RCS ID police.
|
1.2 |
| 01-Jul-1999 |
itojun | branches: 1.2.2; IPv6 kernel code, based on KAME/NetBSD 1.4, SNAP kit 19990628. (Sorry for a big commit, I can't separate this into several pieces...) Pls check sys/netinet6/TODO and sys/netinet6/IMPLEMENTATION for details.
- sys/kern: do not assume single mbuf, accept chained mbuf on passing data from userland to kernel (or other way round). - "midway" ATM card: ATM PVC pseudo device support, like those done in ALTQ package (ftp://ftp.csl.sony.co.jp/pub/kjc/). - sys/netinet/tcp*: IPv4/v6 dual stack tcp support. - sys/netinet/{ip6,icmp6}.h, sys/net/pfkeyv2.h: IETF document assumes those file to be there so we patch it up. - sys/netinet: IPsec additions are here and there. - sys/netinet6/*: most of IPv6 code sits here. - sys/netkey: IPsec key management code - dev/pci/pcidevs: regen
In my understanding no code here is subject to export control so it should be safe.
|
1.1 |
| 28-Jun-1999 |
itojun | branches: 1.1.2; file route6.c was initially added on branch kame.
|
1.1.2.2 |
| 30-Nov-1999 |
itojun | bring in latest KAME (as of 19991130, KAME/NetBSD141) into kame branch just for reference purposes. This commit includes 1.4 -> 1.4.1 sync for kame branch.
The branch does not compile at all (due to the lack of ALTQ and some other source code). Please do not try to modify the branch, this is just for referenre purposes.
synchronization to latest KAME will take place on HEAD branch soon.
|
1.1.2.1 |
| 28-Jun-1999 |
itojun | KAME/NetBSD 1.4 SNAP kit, dated 19990628.
NOTE: this branch (kame) is used just for refernce. this may not compile due to multiple reasons.
|
1.2.2.3 |
| 02-Aug-1999 |
thorpej | Update from trunk.
|
1.2.2.2 |
| 01-Jul-1999 |
thorpej | Sync w/ -current.
|
1.2.2.1 |
| 01-Jul-1999 |
thorpej | file route6.c was added on branch chs-ubc2 on 1999-07-01 23:48:30 +0000
|
1.3.8.1 |
| 27-Dec-1999 |
wrstuden | Pull up to last week's -current.
|
1.3.2.2 |
| 11-Feb-2001 |
bouyer | Sync with HEAD.
|
1.3.2.1 |
| 20-Nov-2000 |
bouyer | Update thorpej_scsipi to -current as of a month ago
|
1.6.4.1 |
| 28-Sep-2000 |
itojun | pullup 1.6 -> 1.7 (approved by releng-1-5) >repair cut-and-paste bug. from: francis dupont. sync with kame
|
1.8.4.2 |
| 10-Oct-2002 |
jdolecek | sync kqueue with -current; this includes merge of gehenna-devsw branch, merge of i386 MP branch, and part of autoconf rototil work
|
1.8.4.1 |
| 10-Jan-2002 |
thorpej | Sync kqueue branch with -current.
|
1.8.2.3 |
| 17-Sep-2002 |
nathanw | Catch up to -current.
|
1.8.2.2 |
| 14-Nov-2001 |
nathanw | Catch up to -current.
|
1.8.2.1 |
| 22-Oct-2001 |
nathanw | Catch up to -current.
|
1.13.32.1 |
| 26-Apr-2007 |
ghen | Pull up following revision(s) (requested by christos in ticket #1766): sys/netinet6/ip6_input.c: revision 1.102 via patch sys/netinet6/route6.c: revision 1.18 via patch sys/netinet6/ip6_var.h: revision 1.41 via patch sys/netinet6/ip6_var.h: revision 1.42 via patch sbin/sysctl/sysctl.8: patch Disable processing of routing header type 0 packets since they can be used of DoS attacks. Provide a sysctl to re-enable them (net.inet6.ip6.rht0). Information from: http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf fix typo.
|
1.13.30.1 |
| 01-Feb-2006 |
yamt | sync with head.
|
1.13.28.1 |
| 26-Apr-2007 |
ghen | Pull up following revision(s) (requested by christos in ticket #1766): sys/netinet6/ip6_input.c: revision 1.102 via patch sys/netinet6/route6.c: revision 1.18 via patch sys/netinet6/ip6_var.h: revision 1.41 via patch sys/netinet6/ip6_var.h: revision 1.42 via patch sbin/sysctl/sysctl.8: patch Disable processing of routing header type 0 packets since they can be used of DoS attacks. Provide a sysctl to re-enable them (net.inet6.ip6.rht0). Information from: http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf fix typo.
|
1.13.24.1 |
| 04-Jun-2007 |
bouyer | Pull up following revision(s) (requested by adrianp in ticket #11330): sys/netinet6/ip6_input.c: revision 1.102 via patch sys/netinet6/route6.c: revision 1.18 via patch sys/netinet6/ip6_var.h: revisions 1.41-1.42 via patch sbin/sysctl/sysctl.8: patch Disable processing of routing header type 0 packets since they can be used of DoS attacks. Provide a sysctl to re-enable them (net.inet6.ip6.rht0). Information from: http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf
|
1.13.18.4 |
| 15-Nov-2007 |
yamt | sync with head.
|
1.13.18.3 |
| 03-Sep-2007 |
yamt | sync with head.
|
1.13.18.2 |
| 30-Dec-2006 |
yamt | sync with head.
|
1.13.18.1 |
| 21-Jun-2006 |
yamt | sync with head.
|
1.13.16.1 |
| 26-Apr-2007 |
ghen | Pull up following revision(s) (requested by christos in ticket #1766): sys/netinet6/ip6_input.c: revision 1.102 via patch sys/netinet6/route6.c: revision 1.18 via patch sys/netinet6/ip6_var.h: revision 1.41 via patch sys/netinet6/ip6_var.h: revision 1.42 via patch sbin/sysctl/sysctl.8: patch Disable processing of routing header type 0 packets since they can be used of DoS attacks. Provide a sysctl to re-enable them (net.inet6.ip6.rht0). Information from: http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf fix typo.
|
1.13.8.1 |
| 04-Jun-2007 |
bouyer | Pull up following revision(s) (requested by adrianp in ticket #11330): sys/netinet6/ip6_input.c: revision 1.102 via patch sys/netinet6/route6.c: revision 1.18 via patch sys/netinet6/ip6_var.h: revisions 1.41-1.42 via patch sbin/sysctl/sysctl.8: patch Disable processing of routing header type 0 packets since they can be used of DoS attacks. Provide a sysctl to re-enable them (net.inet6.ip6.rht0). Information from: http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf
|
1.13.4.1 |
| 04-Jun-2007 |
bouyer | Pull up following revision(s) (requested by adrianp in ticket #11330): sys/netinet6/ip6_input.c: revision 1.102 via patch sys/netinet6/route6.c: revision 1.18 via patch sys/netinet6/ip6_var.h: revisions 1.41-1.42 via patch sbin/sysctl/sysctl.8: patch Disable processing of routing header type 0 packets since they can be used of DoS attacks. Provide a sysctl to re-enable them (net.inet6.ip6.rht0). Information from: http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf
|
1.14.20.2 |
| 10-Dec-2006 |
yamt | sync with head.
|
1.14.20.1 |
| 22-Oct-2006 |
yamt | sync with head
|
1.14.18.1 |
| 18-Nov-2006 |
ad | Sync with head.
|
1.16.4.3 |
| 17-May-2007 |
yamt | sync with head.
|
1.16.4.2 |
| 07-May-2007 |
yamt | sync with head.
|
1.16.4.1 |
| 12-Mar-2007 |
rmind | Sync with HEAD.
|
1.16.2.1 |
| 28-Apr-2007 |
bouyer | Pull up following revision(s) (requested by christos in ticket #587): sys/netinet6/ip6_input.c: revision 1.102 sys/netinet6/route6.c: revision 1.18 sys/netinet6/ip6_var.h: revision 1.41 sys/netinet6/ip6_var.h: revision 1.42 sbin/sysctl/sysctl.8: patch Disable processing of routing header type 0 packets since they can be used of DoS attacks. Provide a sysctl to re-enable them (net.inet6.ip6.rht0). Information from: http://www.secdev.org/conf/IPv6_RH_security-csw07.pdf fix typo.
|
1.17.4.1 |
| 11-Jul-2007 |
mjf | Sync with head.
|
1.17.2.1 |
| 08-Jun-2007 |
ad | Sync with head.
|
1.20.12.1 |
| 13-Nov-2007 |
bouyer | Sync with HEAD
|
1.20.8.1 |
| 06-Nov-2007 |
matt | sync with HEAD
|
1.20.6.1 |
| 31-Oct-2007 |
joerg | Sync with HEAD.
|
1.21.16.1 |
| 02-Jun-2008 |
mjf | Sync with HEAD.
|
1.21.12.1 |
| 22-Feb-2008 |
keiichi | imported Mobile IPv6 code developed by the SHISA project (http://www.mobileip.jp/).
|
1.23.84.1 |
| 26-Feb-2018 |
snj | Pull up following revision(s) (requested by maxv in ticket #569): sys/netinet6/route6.c: 1.24-1.25 Fix the ICMP error code. rh was obtained via IP6_EXTHDR_GET, and it is not guaranteed to be in the same mbuf as ip6, so computing the difference between the pointers may result in a wrong offset. ip6 is now unused, so remove it. -- Remove this code, RH0 must be dropped, according to RFC5095. FreeBSD and OpenBSD already do the same. Also, style, and remove useless includes.
|