On May 8, 2014 12:05:34 PM CDT, Brian Candler <[email protected]> wrote:
>On 08/05/2014 11:51, Olivier Mascia wrote:
>> On the WAN interface, I’m currently allowing full ICMPv6 in, albeit
>only from Global Unicast and Multicast addresses.
>> That is: only from 2000::/3 and ff00::/8.
>I don't think you'll see any packets with multicast source addresses. 
>It's possible you could see packets with Link-Local source addresses 
>(fe80::/64) from the upstream router, but you may not care.
>
>
>_______________________________________________
>List mailing list
>[email protected]
>https://lists.pfsense.org/mailman/listinfo/list

Sorry for the late addition... Perhaps this was already covered, but if not:

Please don't filter ICMPv6.  This is one of the key points every intro-to-v6 
class teaches: IPv6 actually *needs* ICMPv6 to function in pretty much every 
situation.

The official guidance on this subject is RFC 4890, "Recommendations for Firing 
ICMPv6 Messages in Firewalls".
The TL;DR version is " just don't ".
If a firewall operator can't read the RFC, and accurately distinguish between 
transit and local traffic, then they shouldn't filter any of it.

(Yes, I'm being a hard-ass here, because I already see people breaking IPv6 
because they think it's OK to filter ICMP.)

It is probably possible to extrapolate a base set of recommendations that 
pfSense might be able to build in, similar to how there's a lot of automatic 
IPv4 filtering under the hood, but I don't believe this has been done yet.

-Adam
-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
_______________________________________________
List mailing list
[email protected]
https://lists.pfsense.org/mailman/listinfo/list

Reply via email to