Skip to content
This repository

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
Browse code

comment update: RFC3513 states packets with unspecified source addr

must not be forwarded.
  • Loading branch information...
commit 5ad10ea44b618077d1f552b5e535d991907605a9 1 parent a8b4de4
authored

Showing 1 changed file with 2 additions and 5 deletions. Show diff stats Hide diff stats

  1. 7  kame/sys/netinet6/ip6_mroute.c
7  kame/sys/netinet6/ip6_mroute.c
... ...
@@ -1,4 +1,4 @@
1  
-/*	$KAME: ip6_mroute.c,v 1.144 2006/04/09 04:13:53 jinmei Exp $	*/
  1
+/*	$KAME: ip6_mroute.c,v 1.145 2006/04/09 09:19:36 jinmei Exp $	*/
2 2
 
3 3
 /*
4 4
  * Copyright (C) 1998 WIDE Project.
@@ -1242,10 +1242,7 @@ ip6_mforward(ip6, ifp, m)
1242 1242
 
1243 1243
 	/*
1244 1244
 	 * Source address check: do not forward packets with unspecified
1245  
-	 * source. It was discussed in July 2000, on ipngwg mailing list.
1246  
-	 * This is rather more serious than unicast cases, because some
1247  
-	 * MLD packets can be sent with the unspecified source address
1248  
-	 * (although such packets must normally set the hop limit field to 1).
  1245
+	 * source as specified in RFC3513.
1249 1246
 	 */
1250 1247
 	if (IN6_IS_ADDR_UNSPECIFIED(&ip6->ip6_src)) {
1251 1248
 		ip6stat.ip6s_cantforward++;

0 notes on commit 5ad10ea

Please sign in to comment.
Something went wrong with that request. Please try again.