From nobody Sat Nov 16 01:10:06 2024 X-Original-To: net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XqwmG3srpz5cYwW for ; Sat, 16 Nov 2024 01:10:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4XqwmG1t4Qz49QB for ; Sat, 16 Nov 2024 01:10:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1731719406; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=zGp7zMjObPDsVojQeQl98Mv3G6cAZMZZ9OwQVyn9Eyk=; b=GJXiPtgAb5opWMPMDc/rLdGp0CVzQk6nq+rGvrj3wdYyHic6mj9mksGVC+PBE3y3gKumE0 cvufqVY+d47h4voO/08Z7h6EWhP+tBEfAJq5y7YXazt10ywr+wodkZ6W2unTENZLIsD9Gr x4eqWEn5HvicXWSA2Nslo7RVq9uW1D3FfZG7cQBcAZ1ZNswcDxwQi6RsarfRaGPUoykgin XfWqP9GvCMg+aE1R5Ya4Ni0mY6RV63x6xxdep2v2ff5c6svDekerEkM7WHgZdhhjYXRYrf ad644BK5N1rcso5sj9etP29NcGu81VvB39Hpm4zWFMQ5TvR/QPzRLQJN+DqN3A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1731719406; a=rsa-sha256; cv=none; b=Bq3wTC+gStgum3nGlCS0KuTL0P5TyMlEyw7lTQ3jPwFVt6TQ4I18nNMMMK8SgHG6QRQ5jb WnLNXGe13/dlttCuvgzKRrgpgfP0EXtXh+XCOQcCAUzknaxri5gBXauc0QWhS/eTqzef/S dbSbmfFaoA3S5DyAK45MlIYCUExRH9dgob3Tg5Xzufq1IRS9SkOwRAYccC8QwLR8kYIIiu 5t6QmrSIebg6RFiU9dR6rBH2NBwNZdog9zK0cK3vY87NmIr+gKZtw1Cj7tj7KA5+0VITv8 6pnF999EKXcu98dflilCw8PEIB4vnMXprE5kqXS4t3HTDK/iupI/1OuVvoWbgg== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4XqwmG1MBxzmJs for ; Sat, 16 Nov 2024 01:10:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4AG1A6gQ073310 for ; Sat, 16 Nov 2024 01:10:06 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4AG1A6jq073309 for net@FreeBSD.org; Sat, 16 Nov 2024 01:10:06 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 263982] IPv6 Router Advertisement - Route Information Option Date: Sat, 16 Nov 2024 01:10:06 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: dxdt@dev.snart.me X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D263982 --- Comment #5 from David T --- UPDATE: a few things to look out for I just learned that NetworkManager ignores lifetime value in RA messages. W= hat it also ignores is the RIO with zero prefix length, which is in violation of RFC 4191. Pushing default route with an RIO is valid, inferred from followi= ng: > When a type C host receives a Router Advertisement, it modifies its Routing Table as follows. When processing a Router Advertisement, a type C host first updates a ::/0 route based on the Router Lifetime and Default Router Preference in the Router Advertisement message header. Then as the host processes Route Information Options in the Router Advertisement message body, it updates its routing table for each such option. The Router Preference and Lifetime values in a ::/0 Route Information Option override the preference and lifetime values in the Router Advertisement header. https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/blob/main/sr= c/core/ndisc/nm-lndp-ndisc.c#L243 Bugs like these may have prompted pfSense devs to use RIO to push default route. There could be some implementations that ignore the lifetime value in the header but honor lifetime value in the RIO. I'd suggest carefully revie= wing RFC 4191 before implementing it in rtsold. The lifetime field is crucial when making the network fault-tolerant against router failures. --=20 You are receiving this mail because: You are the assignee for the bug.=