Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix IPv6 connectivity when firewall is enabled (fixes #3121) #3122

Merged
merged 1 commit into from May 30, 2022
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
11 changes: 7 additions & 4 deletions woof-code/rootfs-packages/firewall_ng/usr/sbin/firewall_ng
Expand Up @@ -999,22 +999,25 @@ fi
#if [ "\$LOGGING" = "true" ];then
# \$IPT -A icmp_packets -p ICMP -s 0/0 --icmp-type 8 -j LOG \
#--log-prefix "Ping detected: "
# \$IP6T -A icmp_packets -p ICMPV6 --icmpv6-type 8 -j LOG \
# \$IP6T -A icmp_packets -p ICMPV6 --icmpv6-type 128 -j LOG \
#--log-prefix "Ping detected: "
#fi
# \$IPT -A icmp_packets -p ICMP -s 0/0 --icmp-type 8 -j ACCEPT
# \$IP6T -A icmp_packets -p ICMPV6 --icmpv6-type 8 -j ACCEPT
# \$IP6T -A icmp_packets -p ICMPV6 --icmpv6-type 128 -j ACCEPT

# By default, however, drop pings without logging. Blaster
# and other worms have infected systems blasting pings.
# Comment the line below if you want pings logged, but it
# will likely fill your logs.
\$IPT -A icmp_packets -p ICMP -s 0/0 --icmp-type 8 -j DROP
\$IP6T -A icmp_packets -p ICMPV6 --icmpv6-type 8 -j DROP
\$IP6T -A icmp_packets -p ICMPV6 --icmpv6-type 128 -j DROP

# Time Exceeded
\$IPT -A icmp_packets -p ICMP -s 0/0 --icmp-type 11 -j ACCEPT
\$IP6T -A icmp_packets -p ICMPV6 --icmpv6-type 11 -j ACCEPT
\$IP6T -A icmp_packets -p ICMPV6 --icmpv6-type 3 -j ACCEPT

# Neighbour Discovery
\$IP6T -A icmp_packets -p ICMPV6 -s fe80::/10 -j ACCEPT

# Not matched, so return so it will be logged
\$IPT -A icmp_packets -p ICMP -j RETURN
Expand Down