-
Notifications
You must be signed in to change notification settings - Fork 759
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IPv6 FW Rule from WAN IP to ff02 missing (NDP) #3015
Comments
|
We do have all of these hardwired: From your description it looks like this one is "mismatching": The only reason why that would happen is fe80::/10 is not being used as traffic source? |
|
If I'm understanding the rfc correctly, the router should broadcast itself using it's own address, which in our case is send to the gateway instead of being multicasted:
that would mean we should discard route-to for our outbound ipv6-icmp to ff02::/16 traffic, right? |
|
where would reply-to be set? |
|
sorry, route-to.. do you mean "let out anything from firewall host itself" ? |
|
yes, my mistake, I was just looking for the exact reference, but that's it. I can fix this later if you like. we should probably add a rule here, since we also have the others in there too. |
|
but shouldn't the hardcoded ipv6 quick pass without the route-to already catch this? |
|
no, since it's not using fe80::/10, but it's own address to multicast (again, assuming I read the rfc correctly) |
|
why not set from {fe80::/10,ff02::/16} for the out rule then? |
|
and just drop the from part, that would probably be fine too, easiest fix if you ask me. |
|
I see, it would send from its global address oO |
|
@bbaumer one question, do you have IPv6 Upstream Gateway set under WAN or left it at "auto-detect" ? |
... should honour if a gateway was actually provided. It worked or at least was supposed to work in this way before repairing get_interface_gateway*(). PR: #3015
|
I've the same problem with 18.7.8-amd64 and a static internet connection. For me @bbaumer s workaround does not work. I've to do "pfctl -d" and then "pfctl -e" to make it work. |
|
@fichtner: I tried both Settings "IPv6 Upstream Gateway" and "auto-detect". It makes no difference. Actually it is set to "auto-detect". |
|
I want to work on a related oddity still :) |
"pfctl -d" and then "pfctl -e" will only temporarly fix the Problem, because Entries in the Neighbor-Table have a Lifetime (24h). You can look at the Entries with ndp -atn |
|
It's in 18.7.9, closing. |
Freshinstall on Version: 18.7.8
Setup:
Static IPv6 Address on WAN. The ISP-Gateway is on the same Net (Transfer-Net).
After Reboot no IPv6 Communication is possible, because the Neighbor-Discovery can not be completed.
There is an outgoing pass Rule from the WAN-IP to ff02::/16 for icmp6-type 135 (Neighbor Solicitation) missing.
This Rule should be automatically generated.
Workaround:
Generate a Floating Firewall-Rule on the Webinterface with following parameters:
Action: Pass
Quick: Enabled
Interface: Your WAN
Direction: out
TCP/IP Version: IPv6
Protocol: IPV6-ICMP
Source: WAN address
Destination: ff02::/16
Advanced -> disbale reply-to: Enabled
The text was updated successfully, but these errors were encountered: