Bug 987436 - ip6tables doesn't drop/reject IPv6 tcp packet
ip6tables doesn't drop/reject IPv6 tcp packet
Status: CLOSED NOTABUG
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: iptables (Show other bugs)
5.10
All Linux
unspecified Severity medium
: rc
: ---
Assigned To: Thomas Woerner
qe-baseos-daemons
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2013-07-23 07:33 EDT by Hangbin Liu
Modified: 2013-07-23 07:50 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-07-23 07:50:46 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Hangbin Liu 2013-07-23 07:33:53 EDT
Description of problem:
ip6tables doesn't drop/reject IPv6 tcp packet

Version-Release number of selected component (if applicable):
# rpm -qa | grep iptables
iptables-1.3.5-9.2.el5_8
iptables-ipv6-1.3.5-9.2.el5_8
# uname -ri
2.6.18-365.el5 x86_64

How reproducible:
every time

Steps to Reproduce:
1. # ip6tables -A INPUT -m state --state NEW -j REJECT
2. # ssh -6 ::1
3.

Actual results:
# ssh -6 ::1
root@::1's password:

Expected results:
# ssh -6 ::1
ssh: connect to host ::1 port 22: Connection refused

Additional info:
Comment 1 RHEL Product and Program Management 2013-07-23 07:38:28 EDT
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated
in the current release, Red Hat is unable to address this
request at this time.

Red Hat invites you to ask your support representative to
propose this request, if appropriate, in the next release of
Red Hat Enterprise Linux.
Comment 2 Thomas Woerner 2013-07-23 07:50:46 EDT
Please have a look at: https://access.redhat.com/site/solutions/28381
and https://bugzilla.redhat.com/show_bug.cgi?id=243739

Note You need to log in before you can comment on or make changes to this bug.