From: itojun Date: Sun, 12 Mar 2000 04:18:47 +0000 (+0000) Subject: disallow packets to malicious 6to4 prefix, based on X-Git-Url: http://artulab.com/gitweb/?a=commitdiff_plain;h=a919f53d2a91614e39c9b46ac80e39d688a92b5b;p=openbsd disallow packets to malicious 6to4 prefix, based on http://playground.iijlab.net/i-d/draft-itojun-ipv6-transition-abuse-00.txt --- diff --git a/etc/netstart b/etc/netstart index 71ee9b6479f..6d982ff3dc8 100644 --- a/etc/netstart +++ b/etc/netstart @@ -1,6 +1,6 @@ #!/bin/sh - # -# $OpenBSD: netstart,v 1.64 2000/03/10 13:21:51 todd Exp $ +# $OpenBSD: netstart,v 1.65 2000/03/12 04:18:47 itojun Exp $ # Returns true if $1 contains only alphanumerics isalphanumeric() { @@ -53,6 +53,11 @@ if ifconfig lo0 inet6 >/dev/null 2>&1; then # disallow "internal" addresses to appear on the wire. route add -inet6 ::ffff:0.0.0.0 -prefixlen 96 ::1 -reject route add -inet6 ::0.0.0.0 -prefixlen 96 ::1 -reject + # disallow packets to malicious 6to4 prefix + route add -inet6 2002:e000:: -prefixlen 20 ::1 -reject + route add -inet6 2002:7f00:: -prefixlen 24 ::1 -reject + route add -inet6 2002:0000:0000:: -prefixlen 48 ::1 -reject + route add -inet6 2002:ffff:ffff:: -prefixlen 48 ::1 -reject rtsolif="" else