2000-07-17 02:37:26 +00:00
|
|
|
.\" $FreeBSD$
|
2001-06-11 12:39:29 +00:00
|
|
|
.\" $KAME: inet6.4,v 1.21 2001/04/05 01:00:18 itojun Exp $
|
2000-07-17 02:37:26 +00:00
|
|
|
.\"
|
2000-01-06 12:40:54 +00:00
|
|
|
.\" Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
|
|
|
.\" All rights reserved.
|
2000-07-17 02:37:26 +00:00
|
|
|
.\"
|
2000-01-06 12:40:54 +00:00
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\" 3. Neither the name of the project nor the names of its contributors
|
|
|
|
.\" may be used to endorse or promote products derived from this software
|
|
|
|
.\" without specific prior written permission.
|
2000-07-17 02:37:26 +00:00
|
|
|
.\"
|
2000-01-06 12:40:54 +00:00
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
.\" SUCH DAMAGE.
|
|
|
|
.\"
|
|
|
|
.Dd January 29, 1999
|
|
|
|
.Dt INET6 4
|
2000-01-17 15:24:41 +00:00
|
|
|
.Os
|
2000-01-06 12:40:54 +00:00
|
|
|
.Sh NAME
|
|
|
|
.Nm inet6
|
|
|
|
.Nd Internet protocol version 6 family
|
|
|
|
.Sh SYNOPSIS
|
2001-10-01 16:09:29 +00:00
|
|
|
.In sys/types.h
|
|
|
|
.In netinet/in.h
|
2000-01-06 12:40:54 +00:00
|
|
|
.Sh DESCRIPTION
|
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
family is an updated version of
|
|
|
|
.Xr inet 4
|
|
|
|
family.
|
|
|
|
While
|
|
|
|
.Xr inet 4
|
|
|
|
implements Internet Protocol version 4,
|
|
|
|
.Nm
|
|
|
|
implements Internet Protocol version 6.
|
|
|
|
.Pp
|
|
|
|
.Nm
|
|
|
|
is a collection of protocols layered atop the
|
|
|
|
.Em Internet Protocol version 6
|
|
|
|
.Pq Tn IPv6
|
2000-07-17 02:37:26 +00:00
|
|
|
transport layer, and utilizing the IPv6 address format.
|
2000-01-06 12:40:54 +00:00
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
family provides protocol support for the
|
|
|
|
.Dv SOCK_STREAM , SOCK_DGRAM ,
|
|
|
|
and
|
|
|
|
.Dv SOCK_RAW
|
|
|
|
socket types; the
|
|
|
|
.Dv SOCK_RAW
|
|
|
|
interface provides access to the
|
|
|
|
.Tn IPv6
|
|
|
|
protocol.
|
|
|
|
.Sh ADDRESSING
|
2000-07-17 02:37:26 +00:00
|
|
|
IPv6 addresses are 16 byte quantities, stored in network standard byteorder.
|
2000-01-06 12:40:54 +00:00
|
|
|
The include file
|
|
|
|
.Aq Pa netinet/in.h
|
|
|
|
defines this address
|
|
|
|
as a discriminated union.
|
|
|
|
.Pp
|
|
|
|
Sockets bound to the
|
|
|
|
.Nm
|
2001-06-11 12:39:29 +00:00
|
|
|
family utilize the following addressing structure:
|
2000-01-06 12:40:54 +00:00
|
|
|
.Bd -literal -offset indent
|
|
|
|
struct sockaddr_in6 {
|
2002-07-26 08:20:34 +00:00
|
|
|
uint8_t sin6_len;
|
|
|
|
sa_family_t sin6_family;
|
|
|
|
in_port_t sin6_port;
|
|
|
|
uint32_t sin6_flowinfo;
|
2000-01-06 12:40:54 +00:00
|
|
|
struct in6_addr sin6_addr;
|
2002-07-26 08:20:34 +00:00
|
|
|
uint32_t sin6_scope_id;
|
2000-01-06 12:40:54 +00:00
|
|
|
};
|
|
|
|
.Ed
|
|
|
|
.Pp
|
|
|
|
Sockets may be created with the local address
|
|
|
|
.Dq Dv ::
|
2001-08-07 15:48:51 +00:00
|
|
|
(which is equal to IPv6 address
|
|
|
|
.Dv 0:0:0:0:0:0:0:0 )
|
2001-07-16 10:52:19 +00:00
|
|
|
to affect
|
2000-01-06 12:40:54 +00:00
|
|
|
.Dq wildcard
|
2000-07-17 02:37:26 +00:00
|
|
|
matching on incoming messages.
|
2000-01-06 12:40:54 +00:00
|
|
|
.Pp
|
2001-06-11 12:39:29 +00:00
|
|
|
The IPv6 specification defines scoped addresses,
|
|
|
|
like link-local or site-local addresses.
|
2000-03-15 03:38:22 +00:00
|
|
|
A scoped address is ambiguous to the kernel,
|
2001-06-11 12:39:29 +00:00
|
|
|
if it is specified without a scope identifier.
|
2000-03-12 18:09:58 +00:00
|
|
|
To manipulate scoped addresses properly from the userland,
|
2001-06-11 12:39:29 +00:00
|
|
|
programs must use the advanced API defined in RFC2292.
|
|
|
|
A compact description of the advanced API is available in
|
2000-03-12 18:09:58 +00:00
|
|
|
.Xr ip6 4 .
|
2001-06-11 12:39:29 +00:00
|
|
|
If a scoped address is specified without an explicit scope,
|
|
|
|
the kernel may raise an error.
|
2000-07-17 02:37:26 +00:00
|
|
|
Note that scoped addresses are not for daily use at this moment,
|
2001-06-11 12:39:29 +00:00
|
|
|
both from a specification and an implementation point of view.
|
2000-03-01 02:37:46 +00:00
|
|
|
.Pp
|
2001-06-11 12:39:29 +00:00
|
|
|
The KAME implementation supports an extended numeric IPv6 address notation
|
2000-07-17 02:37:26 +00:00
|
|
|
for link-local addresses,
|
2000-01-06 12:40:54 +00:00
|
|
|
like
|
2000-03-01 02:37:46 +00:00
|
|
|
.Dq Li fe80::1%de0
|
|
|
|
to specify
|
|
|
|
.Do
|
|
|
|
.Li fe80::1
|
2000-07-17 02:37:26 +00:00
|
|
|
on
|
2000-03-01 02:37:46 +00:00
|
|
|
.Li de0
|
|
|
|
interface
|
|
|
|
.Dc .
|
2001-06-11 12:39:29 +00:00
|
|
|
This notation is supported by
|
2000-03-01 02:37:46 +00:00
|
|
|
.Xr getaddrinfo 3
|
|
|
|
and
|
|
|
|
.Xr getnameinfo 3 .
|
2000-07-17 02:37:26 +00:00
|
|
|
Some of normal userland programs, such as
|
2000-01-06 12:40:54 +00:00
|
|
|
.Xr telnet 1
|
|
|
|
or
|
2000-07-17 02:37:26 +00:00
|
|
|
.Xr ftp 1 ,
|
2001-06-11 12:39:29 +00:00
|
|
|
are able to use this notation.
|
2000-07-17 02:37:26 +00:00
|
|
|
With special programs
|
|
|
|
like
|
2000-01-06 12:40:54 +00:00
|
|
|
.Xr ping6 8 ,
|
2001-06-11 12:39:29 +00:00
|
|
|
you can specify the outgoing interface by an extra command line option
|
2000-01-06 12:40:54 +00:00
|
|
|
to disambiguate scoped addresses.
|
|
|
|
.Pp
|
|
|
|
Scoped addresses are handled specially in the kernel.
|
2001-06-11 12:39:29 +00:00
|
|
|
In kernel structures like routing tables or interface structures,
|
|
|
|
a scoped address will have its interface index embedded into the address.
|
2000-01-06 12:40:54 +00:00
|
|
|
Therefore,
|
2001-06-11 12:39:29 +00:00
|
|
|
the address in some kernel structures is not the same as that on the wire.
|
|
|
|
The embedded index will become visible through a
|
2000-01-06 12:40:54 +00:00
|
|
|
.Dv PF_ROUTE
|
2000-07-17 02:37:26 +00:00
|
|
|
socket, kernel memory accesses via
|
2000-03-01 02:37:46 +00:00
|
|
|
.Xr kvm 3
|
2001-06-11 12:39:29 +00:00
|
|
|
and on some other occasions.
|
2000-01-06 12:40:54 +00:00
|
|
|
HOWEVER, users should never use the embedded form.
|
2000-07-17 02:37:26 +00:00
|
|
|
For details please consult
|
2000-01-06 12:40:54 +00:00
|
|
|
.Pa IMPLEMENTATION
|
2000-07-17 02:37:26 +00:00
|
|
|
supplied with KAME kit.
|
2000-01-06 12:40:54 +00:00
|
|
|
.Sh PROTOCOLS
|
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
family is comprised of the
|
|
|
|
.Tn IPv6
|
|
|
|
network protocol, Internet Control
|
|
|
|
Message Protocol version 6
|
|
|
|
.Pq Tn ICMPv6 ,
|
|
|
|
Transmission Control Protocol
|
|
|
|
.Pq Tn TCP ,
|
|
|
|
and User Datagram Protocol
|
|
|
|
.Pq Tn UDP .
|
|
|
|
.Tn TCP
|
|
|
|
is used to support the
|
|
|
|
.Dv SOCK_STREAM
|
|
|
|
abstraction while
|
|
|
|
.Tn UDP
|
|
|
|
is used to support the
|
|
|
|
.Dv SOCK_DGRAM
|
|
|
|
abstraction.
|
|
|
|
Note that
|
|
|
|
.Tn TCP
|
|
|
|
and
|
|
|
|
.Tn UDP
|
|
|
|
are common to
|
|
|
|
.Xr inet 4
|
|
|
|
and
|
2000-11-20 18:41:33 +00:00
|
|
|
.Nm .
|
2000-01-06 12:40:54 +00:00
|
|
|
A raw interface to
|
|
|
|
.Tn IPv6
|
|
|
|
is available
|
|
|
|
by creating an Internet socket of type
|
|
|
|
.Dv SOCK_RAW .
|
|
|
|
The
|
|
|
|
.Tn ICMPv6
|
|
|
|
message protocol is accessible from a raw socket.
|
|
|
|
.\" .Pp
|
|
|
|
.\" The 128-bit IPv6 address contains both network and host parts.
|
|
|
|
.\" However, direct examination of addresses is discouraged.
|
|
|
|
.\" For those programs which absolutely need to break addresses
|
|
|
|
.\" into their component parts, the following
|
|
|
|
.\" .Xr ioctl 2
|
|
|
|
.\" commands are provided for a datagram socket in the
|
|
|
|
.\" .Nm
|
|
|
|
.\" domain; they have the same form as the
|
|
|
|
.\" .Dv SIOCIFADDR
|
|
|
|
.\" command (see
|
|
|
|
.\" .Xr intro 4 ) .
|
|
|
|
.\" .Pp
|
|
|
|
.\" .Bl -tag -width SIOCSIFNETMASK
|
|
|
|
.\" .It Dv SIOCSIFNETMASK
|
|
|
|
.\" Set interface network mask.
|
|
|
|
.\" The network mask defines the network part of the address;
|
|
|
|
.\" if it contains more of the address than the address type would indicate,
|
|
|
|
.\" then subnets are in use.
|
|
|
|
.\" .It Dv SIOCGIFNETMASK
|
|
|
|
.\" Get interface network mask.
|
|
|
|
.\" .El
|
|
|
|
.\" .Sh ROUTING
|
|
|
|
.\" The current implementation of Internet protocols includes some routing-table
|
|
|
|
.\" adaptations to provide enhanced caching of certain end-to-end
|
|
|
|
.\" information necessary for Transaction TCP and Path MTU Discovery. The
|
|
|
|
.\" following changes are the most significant:
|
|
|
|
.\" .Bl -enum
|
|
|
|
.\" .It
|
|
|
|
.\" All IP routes, except those with the
|
|
|
|
.\" .Dv RTF_CLONING
|
|
|
|
.\" flag and those to multicast destinations, have the
|
|
|
|
.\" .Dv RTF_PRCLONING
|
|
|
|
.\" flag forcibly enabled (they are thus said to be
|
|
|
|
.\" .Dq "protocol cloning" ).
|
|
|
|
.\" .It
|
|
|
|
.\" When the last reference to an IP route is dropped, the route is
|
|
|
|
.\" examined to determine if it was created by cloning such a route. If
|
|
|
|
.\" this is the case, the
|
|
|
|
.\" .Dv RTF_PROTO3
|
|
|
|
.\" flag is turned on, and the expiration timer is initialized to go off
|
|
|
|
.\" in net.inet.ip.rtexpire seconds. If such a route is re-referenced,
|
|
|
|
.\" the flag and expiration timer are reset.
|
|
|
|
.\" .It
|
|
|
|
.\" A kernel timeout runs once every ten minutes, or sooner if there are
|
|
|
|
.\" soon-to-expire routes in the kernel routing table, and deletes the
|
|
|
|
.\" expired routes.
|
|
|
|
.\" .El
|
|
|
|
.\" .Pp
|
|
|
|
.\" A dynamic process is in place to modify the value of
|
|
|
|
.\" net.inet.ip.rtexpire if the number of cached routes grows too large.
|
|
|
|
.\" If after an expiration run there are still more than
|
|
|
|
.\" net.inet.ip.rtmaxcache unreferenced routes remaining, the rtexpire
|
|
|
|
.\" value is multiplied by 3/4, and any routes which have longer
|
|
|
|
.\" expiration times have those times adjusted. This process is damped
|
|
|
|
.\" somewhat by specification of a minimum rtexpire value
|
|
|
|
.\" (net.inet.ip.rtminexpire), and by restricting the reduction to once in
|
|
|
|
.\" a ten-minute period.
|
|
|
|
.\" .Pp
|
|
|
|
.\" If some external process deletes the original route from which a
|
|
|
|
.\" protocol-cloned route was generated, the ``child route'' is deleted.
|
|
|
|
.\" (This is actually a generic mechanism in the routing code support for
|
|
|
|
.\" protocol-requested cloning.)
|
|
|
|
.\" .Pp
|
|
|
|
.\" No attempt is made to manage routes which were not created by protocol
|
|
|
|
.\" cloning; these are assumed to be static, under the management of an
|
|
|
|
.\" external routing process, or under the management of a link layer
|
|
|
|
.\" (e.g.,
|
|
|
|
.\" .Tn ARP
|
|
|
|
.\" for Ethernets).
|
|
|
|
.\" .Pp
|
|
|
|
.\" Only certain types of network activity will result in the cloning of a
|
|
|
|
.\" route using this mechanism. Specifically, those protocols (such as
|
|
|
|
.\" .Tn TCP
|
|
|
|
.\" and
|
|
|
|
.\" .Tn UDP )
|
|
|
|
.\" which themselves cache a long-lasting reference to route for a destination
|
|
|
|
.\" will trigger the mechanism; whereas raw
|
|
|
|
.\" .Tn IP
|
|
|
|
.\" packets, whether locally-generated or forwarded, will not.
|
2000-03-15 03:38:22 +00:00
|
|
|
.Ss MIB Variables
|
2000-03-12 18:09:58 +00:00
|
|
|
A number of variables are implemented in the net.inet6 branch of the
|
|
|
|
.Xr sysctl 3
|
2000-03-15 03:38:22 +00:00
|
|
|
MIB.
|
|
|
|
In addition to the variables supported by the transport protocols
|
|
|
|
(for which the respective manual pages may be consulted),
|
|
|
|
the following general variables are defined:
|
2000-03-12 18:09:58 +00:00
|
|
|
.Bl -tag -width IPV6CTL_MAXFRAGPACKETS
|
|
|
|
.It Dv IPV6CTL_FORWARDING
|
|
|
|
.Pq ip6.forwarding
|
|
|
|
Boolean: enable/disable forwarding of
|
|
|
|
.Tn IPv6
|
|
|
|
packets.
|
|
|
|
Also, identify if the node is acting as a router.
|
|
|
|
Defaults to off.
|
|
|
|
.It Dv IPV6CTL_SENDREDIRECTS
|
|
|
|
.Pq ip6.redirect
|
|
|
|
Boolean: enable/disable sending of
|
|
|
|
.Tn ICMPv6
|
|
|
|
redirects in response to unforwardable
|
|
|
|
.Tn IPv6
|
|
|
|
packets.
|
|
|
|
This option is ignored unless the node is routing
|
|
|
|
.Tn IPv6
|
|
|
|
packets,
|
|
|
|
and should normally be enabled on all systems.
|
|
|
|
Defaults to on.
|
|
|
|
.It Dv IPV6CTL_DEFHLIM
|
|
|
|
.Pq ip6.hlim
|
2001-07-14 19:41:16 +00:00
|
|
|
Integer: default hop limit value to use for outgoing
|
2000-03-12 18:09:58 +00:00
|
|
|
.Tn IPv6
|
|
|
|
packets.
|
|
|
|
This value applies to all the transport protocols on top of
|
|
|
|
.Tn IPv6 .
|
|
|
|
There are APIs to override the value.
|
|
|
|
.It Dv IPV6CTL_MAXFRAGPACKETS
|
|
|
|
.Pq ip6.maxfragpackets
|
|
|
|
Integer: default maximum number of fragmented packets the node will accept.
|
|
|
|
0 means that the node will not accept any fragmented packets.
|
|
|
|
-1 means that the node will accept as many fragmented packets as it receives.
|
|
|
|
The flag is provided basically for avoiding possible DoS attacks.
|
|
|
|
.It Dv IPV6CTL_ACCEPT_RTADV
|
|
|
|
.Pq ip6.accept_rtadv
|
|
|
|
Boolean: enable/disable receiving of
|
|
|
|
.Tn ICMPv6
|
|
|
|
router advertisement packets,
|
|
|
|
and autoconfiguration of address prefixes and default routers.
|
|
|
|
The node must be a host
|
2001-08-07 15:48:51 +00:00
|
|
|
(not a router)
|
2000-03-12 18:09:58 +00:00
|
|
|
for the option to be meaningful.
|
|
|
|
Defaults to off.
|
|
|
|
.It Dv IPV6CTL_KEEPFAITH
|
|
|
|
.Pq ip6.keepfaith
|
|
|
|
Boolean: enable/disable
|
|
|
|
.Dq FAITH
|
|
|
|
TCP relay IPv6-to-IPv4 translator code in the kernel.
|
|
|
|
Refer
|
|
|
|
.Xr faith 4
|
|
|
|
and
|
|
|
|
.Xr faithd 8
|
|
|
|
for detail.
|
|
|
|
Defaults to off.
|
|
|
|
.It Dv IPV6CTL_LOG_INTERVAL
|
|
|
|
.Pq ip6.log_interval
|
|
|
|
Integer: default interval between
|
|
|
|
.Tn IPv6
|
|
|
|
packet forwarding engine log output
|
2001-08-07 15:48:51 +00:00
|
|
|
(in seconds).
|
2000-03-12 18:09:58 +00:00
|
|
|
.It Dv IPV6CTL_HDRNESTLIMIT
|
|
|
|
.Pq ip6.hdrnestlimit
|
|
|
|
Integer: default number of the maximum
|
|
|
|
.Tn IPv6
|
|
|
|
extension headers
|
|
|
|
permitted on incoming
|
|
|
|
.Tn IPv6
|
|
|
|
packets.
|
|
|
|
If set to 0, the node will accept as many extension headers as possible.
|
|
|
|
.It Dv IPV6CTL_DAD_COUNT
|
|
|
|
.Pq ip6.dad_count
|
|
|
|
Integer: default number of
|
|
|
|
.Tn IPv6
|
|
|
|
DAD
|
|
|
|
.Pq duplicated address detection
|
|
|
|
probe packets.
|
|
|
|
The packets will be generated when
|
|
|
|
.Tn IPv6
|
|
|
|
interface addresses are configured.
|
|
|
|
.It Dv IPV6CTL_AUTO_FLOWLABEL
|
|
|
|
.Pq ip6.auto_flowlabel
|
|
|
|
Boolean: enable/disable automatic filling of
|
|
|
|
.Tn IPv6
|
|
|
|
flowlabel field, for outstanding connected transport protocol packets.
|
|
|
|
The field might be used by intermediate routers to identify packet flows.
|
|
|
|
Defaults to on.
|
|
|
|
.It Dv IPV6CTL_DEFMCASTHLIM
|
|
|
|
.Pq ip6.defmcasthlim
|
|
|
|
Integer: default hop limit value for an
|
|
|
|
.Tn IPv6
|
|
|
|
multicast packet sourced by the node.
|
|
|
|
This value applies to all the transport protocols on top of
|
|
|
|
.Tn IPv6 .
|
|
|
|
There are APIs to override the value as documented in
|
|
|
|
.Xr ip6 4 .
|
|
|
|
.It Dv IPV6CTL_GIF_HLIM
|
|
|
|
.Pq ip6.gifhlim
|
|
|
|
Integer: default maximum hop limit value for an
|
|
|
|
.Tn IPv6
|
|
|
|
packet generated by
|
|
|
|
.Xr gif 4
|
|
|
|
tunnel interface.
|
|
|
|
.It Dv IPV6CTL_KAME_VERSION
|
|
|
|
.Pq ip6.kame_version
|
|
|
|
String: identifies the version of KAME
|
|
|
|
.Tn IPv6
|
|
|
|
stack implemented in the kernel.
|
|
|
|
.It Dv IPV6CTL_USE_DEPRECATED
|
|
|
|
.Pq ip6.use_deprecated
|
|
|
|
Boolean: enable/disable use of deprecated address,
|
|
|
|
specified in RFC2462 5.5.4.
|
|
|
|
Defaults to on.
|
|
|
|
.It Dv IPV6CTL_RR_PRUNE
|
|
|
|
.Pq ip6.rr_prune
|
|
|
|
Integer: default interval between
|
|
|
|
.Tn IPv6
|
|
|
|
router renumbering prefix babysitting, in seconds.
|
2002-05-14 05:32:23 +00:00
|
|
|
.It Dv IPV6CTL_V6ONLY
|
|
|
|
.Pq ip6.v6only
|
2002-05-15 16:37:26 +00:00
|
|
|
Boolean: enable/disable the prohibited use of
|
2000-03-12 18:09:58 +00:00
|
|
|
.Tn IPv4
|
|
|
|
mapped address on
|
|
|
|
.Dv AF_INET6
|
|
|
|
sockets.
|
2002-07-26 11:42:46 +00:00
|
|
|
Defaults to on.
|
2000-07-17 02:37:26 +00:00
|
|
|
.It Dv IPV6CTL_RTEXPIRE
|
|
|
|
.Pq ip6.rtexpire
|
|
|
|
Integer: lifetime in seconds of protocol-cloned
|
|
|
|
.Tn IP
|
|
|
|
routes after the last reference drops (default one hour).
|
|
|
|
.\"This value varies dynamically as described above.
|
|
|
|
.It Dv IPV6CTL_RTMINEXPIRE
|
|
|
|
.Pq ip6.rtminexpire
|
|
|
|
Integer: minimum value of ip.rtexpire (default ten seconds).
|
|
|
|
.\"This value has no effect on user modifications, but restricts the dynamic
|
|
|
|
.\"adaptation described above.
|
|
|
|
.It Dv IPV6CTL_RTMAXCACHE
|
|
|
|
.Pq ip6.rtmaxcache
|
|
|
|
Integer: trigger level of cached, unreferenced, protocol-cloned routes
|
|
|
|
which initiates dynamic adaptation (default 128).
|
2000-03-12 18:09:58 +00:00
|
|
|
.El
|
2000-07-17 02:37:26 +00:00
|
|
|
.Ss Interaction between IPv4/v6 sockets
|
2002-07-26 08:11:51 +00:00
|
|
|
By default,
|
2002-07-26 11:42:46 +00:00
|
|
|
.Fx
|
2002-07-26 08:11:51 +00:00
|
|
|
does not route IPv4 traffic to
|
|
|
|
.Dv AF_INET6
|
|
|
|
sockets.
|
|
|
|
The default behavior intentionally violates RFC2553 for security reasons.
|
|
|
|
Listen to two sockets if you want to accept both IPv4 and IPv6 traffic.
|
|
|
|
IPv4 traffic may be routed with certain
|
|
|
|
per-socket/per-node configuration, however, it is not recommended to do so.
|
|
|
|
Consult
|
|
|
|
.Xr ip6 4
|
|
|
|
for details.
|
|
|
|
.Pp
|
2001-07-14 19:41:16 +00:00
|
|
|
The behavior of
|
2000-07-17 02:37:26 +00:00
|
|
|
.Dv AF_INET6
|
|
|
|
TCP/UDP socket is documented in RFC2553.
|
2001-06-11 12:39:29 +00:00
|
|
|
Basically, it says this:
|
2000-07-17 02:37:26 +00:00
|
|
|
.Bl -bullet -compact
|
|
|
|
.It
|
2001-06-11 12:39:29 +00:00
|
|
|
A specific bind on an
|
2000-07-17 02:37:26 +00:00
|
|
|
.Dv AF_INET6
|
|
|
|
socket
|
2001-08-07 15:48:51 +00:00
|
|
|
.Xr ( bind 2
|
|
|
|
with an address specified)
|
2000-07-17 02:37:26 +00:00
|
|
|
should accept IPv6 traffic to that address only.
|
|
|
|
.It
|
2001-06-11 12:39:29 +00:00
|
|
|
If you perform a wildcard bind
|
|
|
|
on an
|
2000-07-17 02:37:26 +00:00
|
|
|
.Dv AF_INET6
|
|
|
|
socket
|
2001-08-07 15:48:51 +00:00
|
|
|
.Xr ( bind 2
|
2000-07-17 02:37:26 +00:00
|
|
|
to IPv6 address
|
2001-08-07 15:48:51 +00:00
|
|
|
.Li :: ) ,
|
2000-07-17 02:37:26 +00:00
|
|
|
and there is no wildcard bind
|
|
|
|
.Dv AF_INET
|
|
|
|
socket on that TCP/UDP port, IPv6 traffic as well as IPv4 traffic
|
|
|
|
should be routed to that
|
|
|
|
.Dv AF_INET6
|
|
|
|
socket.
|
2001-06-11 12:39:29 +00:00
|
|
|
IPv4 traffic should be seen as if it came from an IPv6 address like
|
2000-07-17 02:37:26 +00:00
|
|
|
.Li ::ffff:10.1.1.1 .
|
2001-06-11 12:39:29 +00:00
|
|
|
This is called an IPv4 mapped address.
|
2000-07-17 02:37:26 +00:00
|
|
|
.It
|
2001-06-11 12:39:29 +00:00
|
|
|
If there are both a wildcard bind
|
2000-07-17 02:37:26 +00:00
|
|
|
.Dv AF_INET
|
2001-06-11 12:39:29 +00:00
|
|
|
socket and a wildcard bind
|
2000-07-17 02:37:26 +00:00
|
|
|
.Dv AF_INET6
|
|
|
|
socket on one TCP/UDP port, they should behave separately.
|
2001-06-11 12:39:29 +00:00
|
|
|
IPv4 traffic should be routed to the
|
2000-07-17 02:37:26 +00:00
|
|
|
.Dv AF_INET
|
2001-06-11 12:39:29 +00:00
|
|
|
socket and IPv6 should be routed to the
|
2000-07-17 02:37:26 +00:00
|
|
|
.Dv AF_INET6
|
|
|
|
socket.
|
|
|
|
.El
|
|
|
|
.Pp
|
2001-06-11 12:39:29 +00:00
|
|
|
However, RFC2553 does not define the ordering constraint between calls to
|
2000-07-17 02:37:26 +00:00
|
|
|
.Xr bind 2 ,
|
2001-06-11 12:39:29 +00:00
|
|
|
nor how IPv4 TCP/UDP port numbers and IPv6 TCP/UDP port numbers
|
|
|
|
relate to each other
|
2001-08-07 15:48:51 +00:00
|
|
|
(should they be integrated or separated).
|
2001-06-11 12:39:29 +00:00
|
|
|
Implemented behavior is very different from kernel to kernel.
|
2000-07-17 02:37:26 +00:00
|
|
|
Therefore, it is unwise to rely too much upon the behavior of
|
|
|
|
.Dv AF_INET6
|
2001-06-11 12:39:29 +00:00
|
|
|
wildcard bind sockets.
|
2000-07-17 02:37:26 +00:00
|
|
|
It is recommended to listen to two sockets, one for
|
|
|
|
.Dv AF_INET
|
|
|
|
and another for
|
|
|
|
.Dv AF_INET6 ,
|
|
|
|
when you would like to accept both IPv4 and IPv6 traffic.
|
|
|
|
.Pp
|
|
|
|
It should also be noted that
|
|
|
|
malicious parties can take advantage of the complexity presented above,
|
|
|
|
and are able to bypass access control,
|
|
|
|
if the target node routes IPv4 traffic to
|
|
|
|
.Dv AF_INET6
|
|
|
|
socket.
|
2001-06-11 12:39:29 +00:00
|
|
|
Users are advised to take care handling connections
|
2000-07-17 02:37:26 +00:00
|
|
|
from IPv4 mapped address to
|
|
|
|
.Dv AF_INET6
|
|
|
|
sockets.
|
2000-01-06 12:40:54 +00:00
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr ioctl 2 ,
|
|
|
|
.Xr socket 2 ,
|
|
|
|
.Xr sysctl 3 ,
|
|
|
|
.Xr icmp6 4 ,
|
|
|
|
.Xr intro 4 ,
|
2000-03-12 18:09:58 +00:00
|
|
|
.Xr ip6 4 ,
|
2000-01-06 12:40:54 +00:00
|
|
|
.Xr tcp 4 ,
|
|
|
|
.Xr ttcp 4 ,
|
|
|
|
.Xr udp 4
|
2000-03-12 18:09:58 +00:00
|
|
|
.Sh STANDARDS
|
|
|
|
.Rs
|
|
|
|
.%A Tatsuya Jinmei
|
|
|
|
.%A Atsushi Onoe
|
|
|
|
.%T "An Extension of Format for IPv6 Scoped Addresses"
|
|
|
|
.%R internet draft
|
2000-07-17 02:37:26 +00:00
|
|
|
.%D June 2000
|
|
|
|
.%N draft-ietf-ipngwg-scopedaddr-format-02.txt
|
2000-03-12 18:09:58 +00:00
|
|
|
.%O work in progress material
|
|
|
|
.Re
|
2000-01-06 12:40:54 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
The
|
|
|
|
.Nm
|
2001-06-11 12:39:29 +00:00
|
|
|
protocol interfaces are defined in RFC2553 and RFC2292.
|
|
|
|
The implementation described herein appeared in the WIDE/KAME project.
|
2000-07-17 02:37:26 +00:00
|
|
|
.Sh BUGS
|
|
|
|
The IPv6 support is subject to change as the Internet protocols develop.
|
|
|
|
Users should not depend on details of the current implementation,
|
|
|
|
but rather the services exported.
|
|
|
|
.Pp
|
|
|
|
Users are suggested to implement
|
|
|
|
.Dq version independent
|
|
|
|
code as much as possible, as you will need to support both
|
|
|
|
.Xr inet 4
|
|
|
|
and
|
2000-11-20 18:41:33 +00:00
|
|
|
.Nm .
|