-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use symbolic ICMP types in MLD rule #18
base: master
Are you sure you want to change the base?
Conversation
Symbolic ICMP types for MLD were added in commit e6e82a5. This commit updates the config file to use them. Signed-off-by: jonathanunderwood <jonathan.underwood@gmail.com>
@jow- unsure if this needs tests updates, but I am struggling to parse the tests - any pointers much appreciated. |
Build and install ucode and run sh script in top level. |
@jow- any chance we can get this merged for 24.10? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Readback via nft gives numbers (but your patch is correct)
@jow- would be great if we could get this into 24.10 (now on rc4) - it's a minimal change and has been working fine for me locally. |
Does it work with firewall3? |
From rfc4890 - Recommendations for Filtering ICMPv6 Messages in Firewalls
According to the content of this document, it seems that these types of ICMP packets coming from the WAN can be safely dropped. On the other hand, for packets coming from the LAN, they need to remain in the Accept state. However, since the current firewall policy allows all traffic from the LAN, there is no issue. |
Symbolic ICMP types for MLD were added in commit e6e82a5. This commit updates the config file to use them.