diff options
author | 2013-03-02 12:28:13 +0000 | |
---|---|---|
committer | 2013-03-02 12:28:13 +0000 | |
commit | daf572fa2ee550f0c571b5de4ca65738271fbf28 (patch) | |
tree | 1ff1a7e29af1cd993bc1bff1e8bbff80c416eaf0 | |
parent | Unbreak softraid compilation with debug enabled. (diff) | |
download | wireguard-openbsd-daf572fa2ee550f0c571b5de4ca65738271fbf28.tar.xz wireguard-openbsd-daf572fa2ee550f0c571b5de4ca65738271fbf28.zip |
When a PF rule contains 'set tos' *followed by* a scrub option, the tos
value is changed to 0x00. Left-over from the previous implementation where
set-tos was part of "scrub". Problem reported by Jason Mader, ok henning
-rw-r--r-- | sbin/pfctl/parse.y | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/sbin/pfctl/parse.y b/sbin/pfctl/parse.y index 359d1a97b63..0cd3c589d6d 100644 --- a/sbin/pfctl/parse.y +++ b/sbin/pfctl/parse.y @@ -1,4 +1,4 @@ -/* $OpenBSD: parse.y,v 1.621 2013/01/16 01:49:20 henning Exp $ */ +/* $OpenBSD: parse.y,v 1.622 2013/03/02 12:28:13 sthen Exp $ */ /* * Copyright (c) 2001 Markus Friedl. All rights reserved. @@ -2232,7 +2232,6 @@ filter_opt : USER uids { | SCRUB '(' scrub_opts ')' { filter_opts.nodf = $3.nodf; filter_opts.minttl = $3.minttl; - filter_opts.settos = $3.settos; filter_opts.randomid = $3.randomid; filter_opts.max_mss = $3.maxmss; if ($3.reassemble_tcp) |