Kristof's reply is priceless:https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=280701#c49
Anybody else seeing the irony in discussing applicability of downstream bugs during a bug report session regarding a series of loosely applied patches from OpenBSD on FreeBSD?
I got unverified information just then that this IPv6 weirdness we're seeing is wider than just ND solicit and advertise. Good times.
It actually doesn't matter if we test on FreeBSD or OPNsense kernel because we talk about the same code change.
I'm seriously discouraged from spending time experimenting with all that stuff to find out what else got broken on the way to report it only to be told "that's downstream problem".
I'm late to the party, but I got the impression that upstream thinks we did this to ourselves by choosing to diverge from their kernel. Would validating it on a vanilla FreeBSD kernel as @Uwe suggested remove that argument? It is a slippery slope.
Can a quick A-B test with their kernel help here as well? Now, this assumes our kernels are not bifurcated to the extent we lose functionality or significantly affect production. I also do not know how feasible this is, or how much work is involved to do this. It was just a thought after reading @Uwe's comment.
Hear ye, hear yeIn an effort to secure your IPvSixes we've dumped some very old code into our stack from a neighboring project.Downstream complainers should appreciate the utmost security provided by the fixes that made parts/all of their IPv6 stack unusable, have some vanilla vanilla and check back in another 12-15 years when the next code import is scheduled to be sponsoredEnd of SecurityAdvisory P.S. We're working hard so you can boot a machine in miliseconds if you promise not you use TCP/IP