Like, why? Who gives a shit. Nobody actually cares about the old bad blood between Netgate/pfSense and Decisio/Opnsense. So the maintainer that broke shit (and did the modern pf port from OpenBSD) works for Netgate and then ignores bug reports from Opnsense blaming Opnsense's kernel
> “Getting stuff upstreamed in other operating systems usually is a lot more difficult, and often you run into a roadblock” “While after a short amount of time, it’s integrated into part of FreeBSD”
okay but Allan you're a src committer so of course you can upstream it.
Why do we even have to do this stupid bickering. SHUT UP AND CODE. And also let the Linux folks fighting over their Rust bullshit have the drama. We don't need this.
I don't see any particular security issue other than an echo reply can be triggered from a local broadcast domain machine. Yes it is a firewall bypass but nothing malicious can be done with it.
If this is an SA, then there are definitely ENs that should have been an SA.
@encthenet I'll support you on this if you want them to rescind the SA. I think labeling it as an SA caused the remediation to be rushed. And every time I think about it, it's like "okay so they gotta be on the same broadcast domain to send you an ND packet, and then ping following to hopefully get a response confirming it exists? But this would never work to scan the entire IPv6 address space and the threat is already on your network you control or is your ISP's modem/router?"