db3l wrote:
Not sure that's your exact issue here, but what happens if you change your rule to just be icmpv6 in general without the type restriction?
Actually, that seemed to hit the spot. Thanks, David. When I removed the "--icmpv6-type" from the ICMPv6 rule, everything seems to work. Looks like I'm OK in that regard now.
otherbbs wrote:
I believe you need a kernel version 2.6.20 or higher in order to support IPv6 stateless filter rules. What does uname -a show?
No problem there. I'm definitely running higher than that:
Code:
Linux [hostname] 2.6.39-linode33 #3 SMP Wed May 25 18:58:07 UTC 2011 i686 i686 i386 GNU/Linux
Since I'm here and I've bent a few ears, let me see if anyone can answer one final question. As stated above, I use some DROP statements to block all incoming packets from known IPs that have attacked my servers in the past. The IPv4 rule I use is something akin to:
Code:
-A INPUT -s 109.169.216.56 -j DROP
This should work for IPv6 addresses too, correct? I can just replace the IPv4 address above with an IPv6 one? I know some services (Apache for sure) require IPv6 addresses to be placed in square brackets ("[2600:3c03::f03c:91ff:fe93:9c48]"), but that's so they won't confuse a port specification with the address ("*:80"). This shouldn't be a problem for ip6tables, right? My DROP rules are mostly automated, so I want to make sure I get that right before I accidentally blow my IPv6 firewall apart.
