Skip to content

Conversation

@brada4
Copy link

@brada4 brada4 commented Feb 1, 2025

Drop ICMPv6 packets that are not explicitly allowed, like falling outside conntrack due to missing embedded state header like in referenced issue

Add older patch and omit singular echo reply as it is traditionally seen only in conntrack state only initiated by echo request.

Fixes: openwrt/openwrt#17800
Supersedes: openwrt/openwrt#17805
Supersedes: #38
Signed-off-by: Andris PE neandris@gmail.com

Drop ICMPv6 packets that are not explicitly allowed, like falling
outside conntrack due to missing embedded state header like in
referenced issue

Add older patch and omit singular echo reply as it is traditionally seen only in
conntrack state only initiated by echo request

Fixes: openwrt/openwrt#17800
Supersedes: openwrt/openwrt#17805
Supersedes: openwrt#38
Signed-off-by:
@brada4
Copy link
Author

brada4 commented Feb 1, 2025

Tested on both fw3 and fw4. Test machine with lan mtu 64 to chop icmp embedded extra header
@hauke @jow- this has to be pushed to fw3 and picked to both stable branches. Thank you in advance.

@f00b4r0
Copy link

f00b4r0 commented Feb 16, 2025

I'd suggest closing #38 if it's not longer relevant: there were no 3rd-party comments there and this will ease maintainer's workload.

@brada4
Copy link
Author

brada4 commented Feb 16, 2025

Kind of does not change much... I linked it to shoot all at once.

@jow-
Copy link
Contributor

jow- commented Mar 17, 2025

Please remove the commented out lines and prefix the commit subject with config:

@brada4 brada4 changed the title [uci config] Drop unaccounted icmp6 packets config: Drop unaccounted icmp6 packets Mar 24, 2025
drop comment

fix typo

Signed-off-by: Andris PE <neandris@gmail.com>
@brada4
Copy link
Author

brada4 commented Mar 24, 2025

@jow- @dave14305 hope all issues fixed?

brada4 added a commit to brada4/openwrt that referenced this pull request Dec 11, 2025
Do not accept unsolicited ICMP echo reply. It is implied by conntrack
state from request already. cf openwrt/firewall4#44
Also exemplified by ipv4 ping rule

Limit peer-to-peer ipsec to ipv6 only as stated in original "ipv6 cpe
requirements" cf openwrt/firewall4#65

Signed-off-by:
brada4 added a commit to brada4/openwrt that referenced this pull request Dec 11, 2025
Do not accept unsolicited ICMP echo reply. It is implied by conntrack
state from request already. cf openwrt/firewall4#44
Also exemplified by ipv4 ping rule

Limit peer-to-peer ipsec to ipv6 only as stated in original "ipv6 cpe
requirements" cf openwrt/firewall4#65

Signed-off-by: Andris PE <neandris@gmail.com>
brada4 added a commit to brada4/openwrt that referenced this pull request Dec 11, 2025
Do not accept unsolicited ICMP echo reply. It is implied by conntrack
state from request already. cf openwrt/firewall4#44
Also exemplified by ipv4 ping rule

Limit peer-to-peer ipsec to ipv6 only as stated in original "ipv6 cpe
requirements" cf openwrt/firewall4#65

Signed-off-by: Andris PE <neandris@gmail.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

ssh stuck at expecting SSH2_MSG_KEX_ECDH_REPLY

4 participants