[Bug 266598] if_ovpn(4) DCO module not supporting correctly IPv6 Traffic Class for tunneled packets
Date: Mon, 26 Sep 2022 11:55:58 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=266598
--- Comment #13 from commit-hook@FreeBSD.org ---
A commit in branch main references this bug:
URL:
https://cgit.FreeBSD.org/src/commit/?id=76e1c9c671043e08bdd951ae6c768b541fdede19
commit 76e1c9c671043e08bdd951ae6c768b541fdede19
Author: Kristof Provost <kp@FreeBSD.org>
AuthorDate: 2022-09-26 09:58:51 +0000
Commit: Kristof Provost <kp@FreeBSD.org>
CommitDate: 2022-09-26 11:54:20 +0000
if_ovpn: fix address family check when traffic class bits are set
When the tunneled (IPv6) traffic had traffic class bits set (but only >=
16) the packet got lost on the receive side.
This happened because the address family check in ovpn_get_af() failed
to mask correctly, so the version check didn't match, causing us to drop
the packet.
While here also extend the existing 6-in-6 test case to trigger this
issue.
PR: 266598
Sponsored by: Rubicon Communications, LLC ("Netgate")
sys/net/if_ovpn.c | 2 +-
tests/sys/net/if_ovpn/if_ovpn.sh | 1 +
2 files changed, 2 insertions(+), 1 deletion(-)
--
You are receiving this mail because:
You are the assignee for the bug.