[syslinux] Bug#793921: tftpd-hpa: IPv6 address cannonization breaks IPv4

Jason Gunthorpe jgunthorpe at obsidianresearch.com
Wed Aug 5 21:50:55 PDT 2015


On Wed, Jul 29, 2015 at 05:34:00PM +0930, Ron wrote:
> > This commit:
> > 
> >  tftp: convert IPv6-mapped IPv4 addresses to IPv4
> > 
> >  If we receive IPv4 addresses mapped to IPv6, convert them back to IPv4
> >  so that mapping scripts which use \i behave sanely.
> > 
> >  Signed-off-by: H. Peter Anvin <hpa at zytor.com>
> > 
> > Totally breaks IPv4 support when tftpd is used with an IPv6 listening socket
> > (eg when invoked from systemd)

> I think I can see a couple of ways this might start to wind down a
> rathole of workaround upon workaround for various network
> configurations

I haven't seen a followup from HPA, so I wanted to quickly comment on
this point..

> (like if the machine is only listening on an IPv6 socket, will local
> policy even allow it to send from an IPv4 one etc.)

IPv4 running in a IPv6 socket is indistinguishable at the
policy/firewall/etc level from proper IPv4, there should be no
downside to receiving a connect on a IPv6 listening socket and then
switching to an IPv4 socket for further communication.

> It's also not clear to me that croaking with an assert is the ideal
> response here, but logging a warning at least would definitely be
> helpful.

That can be changed. However, if the assert triggers it indicates a
logic flaw of some kind in the normalization code.

Jason


More information about the Syslinux mailing list