summaryrefslogtreecommitdiffstats
path: root/include/net/netfilter/nf_conntrack_seqadj.h
diff options
context:
space:
mode:
authorPhil Oester2013-06-26 23:16:28 +0200
committerPablo Neira Ayuso2013-08-28 00:13:12 +0200
commitaffe759dbaa9e6c08b0da0a11d1933b61f199f51 (patch)
treef232ec8dcf549c3903b3a959480e79e9dba573c1 /include/net/netfilter/nf_conntrack_seqadj.h
parente1000e: balance semaphore put/get for 82573 (diff)
downloadkernel-qcow2-linux-affe759dbaa9e6c08b0da0a11d1933b61f199f51.tar.gz
kernel-qcow2-linux-affe759dbaa9e6c08b0da0a11d1933b61f199f51.tar.xz
kernel-qcow2-linux-affe759dbaa9e6c08b0da0a11d1933b61f199f51.zip
netfilter: ip[6]t_REJECT: tcp-reset using wrong MAC source if bridged
As reported by Casper Gripenberg, in a bridged setup, using ip[6]t_REJECT with the tcp-reset option sends out reset packets with the src MAC address of the local bridge interface, instead of the MAC address of the intended destination. This causes some routers/firewalls to drop the reset packet as it appears to be spoofed. Fix this by bypassing ip[6]_local_out and setting the MAC of the sender in the tcp reset packet. This closes netfilter bugzilla #531. Signed-off-by: Phil Oester <kernel@linuxace.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'include/net/netfilter/nf_conntrack_seqadj.h')
0 files changed, 0 insertions, 0 deletions