On 2015/11/28 15:57, Reyk Floeter wrote:
> On Sat, Nov 28, 2015 at 03:19:20PM +0100, Gregor Best wrote:
> > Hi bugs@,
> > 
> > it turns out it was just a concidence that I've only noticed the
> > broken IPv6 setup after the upgrade. The real cause of the problem
> > was a half-set up iked which installed
> > 
> >     flow esp out from ::/0 to ::/0 type deny
> > 
> > as a default IPSEC flow. This persisted after a reboot because I had
> > already enabled iked to be started by default. Martin requesting
> > configuration files then caused me to cut down the set up so I could
> > provide a minimal configuration that yields the problem and of
> > course after disabling iked and rebooting, everything worked fine.
> > 
> > The bottom line is: nothing to see here but a stupid operator.
> > Thanks and sorry for wasting your time :)
> > 
> 
> You're not the only one who fell into this trap.
> 
> But it is documented, right in the beginning of the iked(8) manpage:
> ---snip---
>      The options are as follows:
> 
>      -6      Disable automatic blocking of IPv6 traffic.  By default, iked
>              blocks any IPv6 traffic unless a flow for this address family has
>              been negotiated.  This option is used to prevent VPN traffic
>              leakages on dual stack hosts.
> ---snap---
> 
> So what should I do, disable this because people don't read the main
> and well-written manpage?

It's an important feature and good to have by default.

A possible alternative would be to reject the config with an explicit
error unless either "flow esp out from ::/0 to ::/0 type deny" or -6
is used. I don't think that would be worth the trouble though.

Reply via email to