Hi! While playing with npf I noticed that some (fragmented) ipv6 packets would not be passed.
Tracking it down (a bit) i've found that simply activating npf without any rule
ntpctl start
'blocks' a
ping6 -s 2048 testhost
which worked w/o npf aktivated flawlessly.
BTW: ipv4 fragmented packets seems to be handled correctly under npf
('ping -s 2048' works).
This happens under HEAD and netbsd-7.
Is this a known limitation of npf? Or a bug?
Send-pr?
Regards, Markus.
