=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/etc/netstart,v retrieving revision 1.65 retrieving revision 1.66 diff -c -r1.65 -r1.66 *** src/etc/netstart 2000/03/12 04:18:47 1.65 --- src/etc/netstart 2000/03/17 17:40:31 1.66 *************** *** 1,6 **** #!/bin/sh - # ! # $OpenBSD: netstart,v 1.65 2000/03/12 04:18:47 itojun Exp $ # Returns true if $1 contains only alphanumerics isalphanumeric() { --- 1,6 ---- #!/bin/sh - # ! # $OpenBSD: netstart,v 1.66 2000/03/17 17:40:31 itojun Exp $ # Returns true if $1 contains only alphanumerics isalphanumeric() { *************** *** 47,63 **** # IPv6 configurations. ip6kernel=YES ! # disallow scoped unicast dest without outgoing scope identifiers. route add -inet6 fe80:: -prefixlen 10 ::1 -reject ! route add -inet6 fc80:: -prefixlen 10 ::1 -reject # disallow "internal" addresses to appear on the wire. route add -inet6 ::ffff:0.0.0.0 -prefixlen 96 ::1 -reject ! route add -inet6 ::0.0.0.0 -prefixlen 96 ::1 -reject ! # disallow packets to malicious 6to4 prefix route add -inet6 2002:e000:: -prefixlen 20 ::1 -reject route add -inet6 2002:7f00:: -prefixlen 24 ::1 -reject ! route add -inet6 2002:0000:0000:: -prefixlen 48 ::1 -reject ! route add -inet6 2002:ffff:ffff:: -prefixlen 48 ::1 -reject rtsolif="" else --- 47,90 ---- # IPv6 configurations. ip6kernel=YES ! # disallow link-local unicast dest without outgoing scope identifiers. route add -inet6 fe80:: -prefixlen 10 ::1 -reject ! ! # disallow site-local unicast dest without outgoing scope identifiers.. ! # If you configure site-locals without scope id (it is permissible ! # config for routers that are not on scope boundary), you may want ! # to comment the line out. ! route add -inet6 fec0:: -prefixlen 10 ::1 -reject ! # disallow "internal" addresses to appear on the wire. route add -inet6 ::ffff:0.0.0.0 -prefixlen 96 ::1 -reject ! ! # disallow packets to malicious IPv4 compatible prefix. ! route add -inet6 ::224.0.0.0 -prefixlen 100 ::1 -reject ! route add -inet6 ::127.0.0.0 -prefixlen 104 ::1 -reject ! route add -inet6 ::0.0.0.0 -prefixlen 104 ::1 -reject ! route add -inet6 ::255.0.0.0 -prefixlen 104 ::1 -reject ! ! # disallow packets to malicious 6to4 prefix. route add -inet6 2002:e000:: -prefixlen 20 ::1 -reject route add -inet6 2002:7f00:: -prefixlen 24 ::1 -reject ! route add -inet6 2002:0000:: -prefixlen 24 ::1 -reject ! route add -inet6 2002:ff00:: -prefixlen 24 ::1 -reject ! ! # Completely disallow packets to IPv4 compatible prefix. ! # This may conflict with RFC1933 under following circumstances: ! # (1) An IPv6-only KAME node tries to originate packets to IPv4 ! # comatible destination. The KAME node has no IPv4 compatible ! # support. Under RFC1933, it should transmit native IPv6 ! # packets toward IPv4 compatible destination, hoping it would ! # reach a router that forwards the packet toward auto-tunnel ! # interface. ! # (2) An IPv6-only node originates a packet to IPv4 compatible ! # destination. A KAME node is acting as an IPv6 router, and ! # asked to forward it. ! # Due to rare use of IPv4 compatible address, and security issues ! # with it, we disable it by default. ! route add -inet6 ::0.0.0.0 -prefixlen 96 ::1 -reject rtsolif="" else