From owner-freebsd-bugs@FreeBSD.ORG Fri Jan 17 20:00:01 2014 Return-Path: Delivered-To: freebsd-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 5DC09D0D for ; Fri, 17 Jan 2014 20:00:01 +0000 (UTC) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 323DF152D for ; Fri, 17 Jan 2014 20:00:01 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id s0HK01D5065245 for ; Fri, 17 Jan 2014 20:00:01 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id s0HK01Sm065244; Fri, 17 Jan 2014 20:00:01 GMT (envelope-from gnats) Date: Fri, 17 Jan 2014 20:00:01 GMT Message-Id: <201401172000.s0HK01Sm065244@freefall.freebsd.org> To: freebsd-bugs@FreeBSD.org Cc: From: Anton Sayetsky Subject: Re: kern/185854: ipfw reads breaks IPv6 traffic X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list Reply-To: Anton Sayetsky List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 Jan 2014 20:00:01 -0000 The following reply was made to PR kern/185854; it has been noted by GNATS. From: Anton Sayetsky To: Nikolay Denev , bug-followup@freebsd.org Cc: Subject: Re: kern/185854: ipfw reads breaks IPv6 traffic Date: Fri, 17 Jan 2014 21:55:34 +0200 2014/1/17 Nikolay Denev : > Having "ipfw add reass ip from any to any" rule in the ruleset breaks all ipv6 traffic. AFAIK, reass doesn't works for v6, and this is a known issue.