Browse Source

Use inet6 pf rules only for inet6-capable setups, first spotted

by form@pdp-11.org.ru.
ok todd@ henning@
OPENBSD_3_7
grange 19 years ago
parent
commit
54aa8f7176
1 changed files with 5 additions and 3 deletions
  1. +5
    -3
      src/etc/rc

+ 5
- 3
src/etc/rc View File

@ -1,4 +1,4 @@
# $OpenBSD: rc,v 1.256 2004/09/27 16:08:26 henning Exp $
# $OpenBSD: rc,v 1.257 2004/10/19 06:45:36 grange Exp $
# System startup script run by init on autoboot
# or after single-user.
@ -142,8 +142,10 @@ if [ "X${pf}" != X"NO" ]; then
RULES="$RULES\npass in proto tcp from any to any port 22 keep state"
RULES="$RULES\npass out proto { tcp, udp } from any to any port 53 keep state"
RULES="$RULES\npass out inet proto icmp all icmp-type echoreq keep state"
RULES="$RULES\npass out inet6 proto icmp6 all icmp6-type routersol"
RULES="$RULES\npass in inet6 proto icmp6 all icmp6-type routeradv"
if ifconfig lo0 inet6 >/dev/null 2>&1; then
RULES="$RULES\npass out inet6 proto icmp6 all icmp6-type routersol"
RULES="$RULES\npass in inet6 proto icmp6 all icmp6-type routeradv"
fi
RULES="$RULES\npass proto { pfsync, carp }"
case `sysctl vfs.mounts.nfs 2>/dev/null` in
*[1-9]*)


Loading…
Cancel
Save