lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20200402084923.4233e2ed@hermes.lan>
Date:   Thu, 2 Apr 2020 08:49:23 -0700
From:   Stephen Hemminger <stephen@...workplumber.org>
To:     netdev@...r.kernel.org
Subject: Fw: [Bug 207063] New: vrf route oif problem



Begin forwarded message:

Date: Thu, 02 Apr 2020 14:15:58 +0000
From: bugzilla-daemon@...zilla.kernel.org
To: stephen@...workplumber.org
Subject: [Bug 207063] New: vrf route oif problem


https://bugzilla.kernel.org/show_bug.cgi?id=207063

            Bug ID: 207063
           Summary: vrf route oif problem
           Product: Networking
           Version: 2.5
    Kernel Version: 5.5.11
          Hardware: All
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: IPV4
          Assignee: stephen@...workplumber.org
          Reporter: 1455793380@...com
        Regression: No

Created attachment 288155
  --> https://bugzilla.kernel.org/attachment.cgi?id=288155&action=edit  
vrf route oif problem

first create vrf
#ip link add vrf-1 type vrf table 10
#ip link set dev vrf-1 up

then add default route and set local table
#ip route add table 10 unreachable default metric 4278198272
#ip rule add pref 32765 table local
#ip rule del pref 0

set slave interfaces
#ip link set dev ens19 master vrf-1
#ip link set dev ens20 master vrf-1

and then add ip
#ip a a 2.2.2.2/24 dev ens19
#ip a a 3.3.3.3/24 dev ens20

add default route
#ip route add default via 2.2.2.2 dev ens19 table 10 metric 300
#ip route add default via 3.3.3.3 dev ens20 table 10 metric 301

use command to test the route
#ip r g 5.5.5.5 oif ens20

but the result is 2.2.2.2 not 3.3.3.3
don't match the oif!!

I try with kernel vesion 5.5.11

-- 
You are receiving this mail because:
You are the assignee for the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ