diff options
| author | 2013-06-26 17:16:28 -0400 | |
|---|---|---|
| committer | 2013-08-28 00:13:12 +0200 | |
| commit | affe759dbaa9e6c08b0da0a11d1933b61f199f51 (patch) | |
| tree | f232ec8dcf549c3903b3a959480e79e9dba573c1 /include/uapi/linux/netfilter | |
| parent | e1000e: balance semaphore put/get for 82573 (diff) | |
| download | linux-dev-affe759dbaa9e6c08b0da0a11d1933b61f199f51.tar.xz linux-dev-affe759dbaa9e6c08b0da0a11d1933b61f199f51.zip | |
netfilter: ip[6]t_REJECT: tcp-reset using wrong MAC source if bridged
As reported by Casper Gripenberg, in a bridged setup, using ip[6]t_REJECT
with the tcp-reset option sends out reset packets with the src MAC address
of the local bridge interface, instead of the MAC address of the intended
destination. This causes some routers/firewalls to drop the reset packet
as it appears to be spoofed. Fix this by bypassing ip[6]_local_out and
setting the MAC of the sender in the tcp reset packet.
This closes netfilter bugzilla #531.
Signed-off-by: Phil Oester <kernel@linuxace.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'include/uapi/linux/netfilter')
0 files changed, 0 insertions, 0 deletions
