<feed xmlns='http://www.w3.org/2005/Atom'>
<title>dhcpcd.git, branch dhcpcd-7.2.2</title>
<subtitle>DHCP / IPv4LL / IPv6RA / DHCPv6 client
</subtitle>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/'/>
<entry>
<title>DHCPv6: Fix exclude prefix length check.</title>
<updated>2019-05-04T09:19:02+00:00</updated>
<author>
<name>Roy Marples</name>
<email>roy@marples.name</email>
</author>
<published>2019-05-04T09:19:02+00:00</published>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/commit/?id=d30538898e39cc9a49ced4e67e91013d1d84a2c2'/>
<id>d30538898e39cc9a49ced4e67e91013d1d84a2c2</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Release dhcpcd-7.2.2</title>
<updated>2019-05-04T08:41:16+00:00</updated>
<author>
<name>Roy Marples</name>
<email>roy@marples.name</email>
</author>
<published>2019-05-04T08:41:16+00:00</published>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/commit/?id=ba146897a3c8268406a6553533f79057d21ee0b1'/>
<id>ba146897a3c8268406a6553533f79057d21ee0b1</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>sun: More validation around route messages</title>
<updated>2019-05-04T08:17:01+00:00</updated>
<author>
<name>Roy Marples</name>
<email>roy@marples.name</email>
</author>
<published>2019-05-04T08:17:01+00:00</published>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/commit/?id=c4188c7a7a73f108eceda4a549d42188d77c8731'/>
<id>c4188c7a7a73f108eceda4a549d42188d77c8731</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>sun: Apply same RTM validation from BSD</title>
<updated>2019-05-03T15:44:13+00:00</updated>
<author>
<name>Roy Marples</name>
<email>roy@marples.name</email>
</author>
<published>2019-05-03T15:44:13+00:00</published>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/commit/?id=46af7e26355da129c6d58b214f54792e9515d0a1'/>
<id>46af7e26355da129c6d58b214f54792e9515d0a1</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>BSD: Ignore coverity errors</title>
<updated>2019-05-03T15:27:35+00:00</updated>
<author>
<name>Roy Marples</name>
<email>roy@marples.name</email>
</author>
<published>2019-05-03T15:27:35+00:00</published>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/commit/?id=7c361f62838e029d4b234f7e772bf8dd5447e798'/>
<id>7c361f62838e029d4b234f7e772bf8dd5447e798</id>
<content type='text'>
We could do ((char *)rtm) + rtm-&gt;rtm_msglen but that looks
more ugly than rtm + 1.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We could do ((char *)rtm) + rtm-&gt;rtm_msglen but that looks
more ugly than rtm + 1.
</pre>
</div>
</content>
</entry>
<entry>
<title>BSD: Validate RTM message lengths received</title>
<updated>2019-05-03T14:44:51+00:00</updated>
<author>
<name>Roy Marples</name>
<email>roy@marples.name</email>
</author>
<published>2019-05-03T14:44:51+00:00</published>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/commit/?id=ff89567168e3c3ea4669d4f7bb43a3400fef6c28'/>
<id>ff89567168e3c3ea4669d4f7bb43a3400fef6c28</id>
<content type='text'>
Doubtful these lengths would be invalid, but you never know.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Doubtful these lengths would be invalid, but you never know.
</pre>
</div>
</content>
</entry>
<entry>
<title>BPF: Fix ARP BPF filter to actually filter unwanted ARP message types</title>
<updated>2019-05-03T13:50:28+00:00</updated>
<author>
<name>Roy Marples</name>
<email>roy@marples.name</email>
</author>
<published>2019-05-03T13:50:28+00:00</published>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/commit/?id=cced5f563de22984fdbc38299b65ba0de128f31b'/>
<id>cced5f563de22984fdbc38299b65ba0de128f31b</id>
<content type='text'>
While here, clarify the BPF instruction space needed for ARP as it
could overflow in the very unlikely event we ARP for three
addresses at the same time.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
While here, clarify the BPF instruction space needed for ARP as it
could overflow in the very unlikely event we ARP for three
addresses at the same time.
</pre>
</div>
</content>
</entry>
<entry>
<title>DHCPv6: Fix a potential read overflow with D6_OPTION_PD_EXCLUDE</title>
<updated>2019-05-03T13:44:06+00:00</updated>
<author>
<name>Roy Marples</name>
<email>roy@marples.name</email>
</author>
<published>2019-05-03T13:44:06+00:00</published>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/commit/?id=024bc211772338002f964b1f6dd223e638428665'/>
<id>024bc211772338002f964b1f6dd223e638428665</id>
<content type='text'>
dhcpcd only checks that the prefix length of the exclusion
matches the prefix length of the ia and equals the length of the
data in the option.
This could potentially overrun the in6_addr structure.

This is fixed by enforcing RFC 6603 section 4.2 option limits
more clearly.

Thanks to Maxime Villard &lt;max@m00nbsd.net&gt; for finding this.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
dhcpcd only checks that the prefix length of the exclusion
matches the prefix length of the ia and equals the length of the
data in the option.
This could potentially overrun the in6_addr structure.

This is fixed by enforcing RFC 6603 section 4.2 option limits
more clearly.

Thanks to Maxime Villard &lt;max@m00nbsd.net&gt; for finding this.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix a small brain fart causing LINK_UNKNOWN to spin.</title>
<updated>2019-05-02T20:48:52+00:00</updated>
<author>
<name>Roy Marples</name>
<email>roy@marples.name</email>
</author>
<published>2019-05-02T20:48:52+00:00</published>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/commit/?id=4f6f72cd3807e0c3ebcf450007612b1c79fc143a'/>
<id>4f6f72cd3807e0c3ebcf450007612b1c79fc143a</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>BSD: Simplify carrier detection once more.</title>
<updated>2019-05-02T20:25:57+00:00</updated>
<author>
<name>Roy Marples</name>
<email>roy@marples.name</email>
</author>
<published>2019-05-02T20:25:57+00:00</published>
<link rel='alternate' type='text/html' href='https://roy.marples.name/cgit/dhcpcd.git/commit/?id=fbfa48bcfc205f3ab607ef0f9cd65e3e8948bc43'/>
<id>fbfa48bcfc205f3ab607ef0f9cd65e3e8948bc43</id>
<content type='text'>
RTM_IFINFO messages now send the un-molested link status to
the main carrier handler which no longer polls on LINK_UNKNOWN.
Instead, we check carrier status directly, which if unsupported
we instead interface flags.

This is 2019, all interface drivers should report link status
correctly via RTM_IFINFO messages and trying to constantly work
around this is error prone and time consuming.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
RTM_IFINFO messages now send the un-molested link status to
the main carrier handler which no longer polls on LINK_UNKNOWN.
Instead, we check carrier status directly, which if unsupported
we instead interface flags.

This is 2019, all interface drivers should report link status
correctly via RTM_IFINFO messages and trying to constantly work
around this is error prone and time consuming.
</pre>
</div>
</content>
</entry>
</feed>
