Summary: | DNAT host incorrectly rejected when last octet is 0 | ||
---|---|---|---|
Product: | IPFire | Reporter: | Craig Putnam <itsupport> |
Component: | --- | Assignee: | Alexander Marx <alexander.marx> |
Status: | CLOSED FIXED | QA Contact: | |
Severity: | Minor Usability | ||
Priority: | Will affect an average number of users | CC: | arne.fitzenreiter, peter.mueller, roland.schaffer, stefan.schantl |
Version: | 2 | ||
Hardware: | all | ||
OS: | All | ||
Bug Depends on: | |||
Bug Blocks: | 12278 | ||
Attachments: | attachment-15129-0.html |
Description
Craig Putnam
2016-09-14 15:27:06 UTC
*** Bug 11128 has been marked as a duplicate of this bug. *** Is this bug still valid? (Cleaning up the bug list... :-) ) Created attachment 543 [details] attachment-15129-0.html Hi! I am sorry, I have no lab to test it. I will have one next week. nest regards, Roland Am Mittwoch, den 08.11.2017, 17:09 +0000 schrieb bugzilla@ipfire.org: > Peter Müller changed bug 11184 > What Removed Added > CC peter.mueller@link38.eu > Comment # 2 on bug 11184 from Peter Müller > Is this bug still valid? (Cleaning up the bug list... :-) ) > You are receiving this mail because: > You are on the CC list for the bug. Well, as far as i understand DNAT, the sense is to redirect an incoming request to a special target. A network is not a special target and i am not able to see a sense in redirecting a request to a network. ( Octet 0 is the network address if i am right) From my point of view this is not a bug. It is a bug. The code not check the network address it check if the last octet is zero. This check is wrong for hosts inside the network if the network is larger than /24. See duplicate bug https://bugzilla.ipfire.org/show_bug.cgi?id=11128 for more details. Bug has been fixed years ago with the following commit: https://git.ipfire.org/?p=ipfire-2.x.git;a=commit;h=bbe8e009b824aef745c9ab9718dce9a1b557f5fc |