NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: kern/52554: IPv6 connections not routing to default gateway
The following reply was made to PR kern/52554; it has been noted by GNATS.
From: Roy Bixler <rcbixler%nyx.net@localhost>
To: gnats-bugs%NetBSD.org@localhost
Cc: ozaki-r%NetBSD.org@localhost, gnats-admin%netbsd.org@localhost, netbsd-bugs%netbsd.org@localhost
Subject: Re: kern/52554: IPv6 connections not routing to default gateway
Date: Fri, 29 Sep 2017 07:56:13 -0600
On Thu, Sep 28, 2017 at 09:55:01PM +0000, Ryota Ozaki wrote:
> Oh sorry, I suppose to see packets of telnet by tcpdump on br0 and eth0
> of Linux. I suspected that a SYN packet is broken and filtered out on the
> interfaces for some reasons. And also we may see a SYNACK packet on
> the interfaces if a SYN packet reaches the server.
I wasn't thinking the same way, since I have had success with IPv6 on
guests running different operating systems, like NetBSD 7.1. I also
have success with IPv6 on NetBSD 8 when connecting to other hosts on
the same LAN. That only changes when I try to connect outside the
LAN.
I decided to try something different, which is an "ssh" connection
with IPv6 to a host outside of the LAN. I run tcpdump locally and on
the remote host. What appears to happen is that the NetBSD 8 host
sends its SYN packets, the remote host receives them and tries to
reply, but NetBSD 8 never sees the replies.
Here's the trace from NetBSD 8 (times in UTC):
13:27:00.789450 IP6 2620:105:c000:3:58a4:a8c:71ce:44f9.65532 >
2620:105:c002:2:5054:ff:feaa:dbd1.ssh: Flags [S], seq 4071621244, win
32768, options [mss 1440,nop,wscale 3,sackOK,TS val 1 ecr 0], length 0
13:27:06.788199 IP6 2620:105:c000:3:58a4:a8c:71ce:44f9.65532 >
2620:105:c002:2:5054:ff:feaa:dbd1.ssh: Flags [S], seq 4071621244, win
32768, options [mss 1440,nop,wscale 3,sackOK,TS val 13 ecr 0], length
0
13:27:18.794959 IP6 2620:105:c000:3:58a4:a8c:71ce:44f9.65532 >
2620:105:c002:2:5054:ff:feaa:dbd1.ssh: Flags [S], seq 4071621244, win
32768, options [mss 1440,nop,wscale 3,sackOK,TS val 37 ecr 0], length
0
13:27:42.808871 IP6 2620:105:c000:3:58a4:a8c:71ce:44f9.65532 >
2620:105:c002:2:5054:ff:feaa:dbd1.ssh: Flags [S], seq 4071621244, win
32768, options [mss 1440,nop,wscale 3,sackOK,TS val 85 ecr 0], length
0
and from the remote host (times local ~ 4 sec. fast):
08:27:04.693607 IP6 2620:105:c000:3:58a4:a8c:71ce:44f9.65532 >
2620:105:c002:2:5054:ff:feaa:dbd1.ssh: Flags [S], seq 4071621244, win
32768, options [mss 1440,nop,wscale 3,sackOK,TS val 1 ecr 0], length 0
08:27:04.693706 IP6 2620:105:c002:2:5054:ff:feaa:dbd1.ssh >
2620:105:c000:3:58a4:a8c:71ce:44f9.65532: Flags [S.], seq 3269583768,
ack 4071621245, win 28560, options [mss 1440,sackOK,TS val 577917728
ecr 1,nop,wscale 7], length 0
08:27:05.692834 IP6 2620:105:c002:2:5054:ff:feaa:dbd1.ssh >
2620:105:c000:3:58a4:a8c:71ce:44f9.65532: Flags [S.], seq 3269583768,
ack 4071621245, win 28560, options [mss 1440,sackOK,TS val 577918728
ecr 1,nop,wscale 7], length 0
08:27:07.692864 IP6 2620:105:c002:2:5054:ff:feaa:dbd1.ssh >
2620:105:c000:3:58a4:a8c:71ce:44f9.65532: Flags [S.], seq 3269583768,
ack 4071621245, win 28560, options [mss 1440,sackOK,TS val 577920728
ecr 1,nop,wscale 7], length 0
08:27:10.692697 IP6 2620:105:c000:3:58a4:a8c:71ce:44f9.65532 >
2620:105:c002:2:5054:ff:feaa:dbd1.ssh: Flags [S], seq 4071621244, win
32768, options [mss 1440,nop,wscale 3,sackOK,TS val 13 ecr 0], length
0
08:27:10.692760 IP6 2620:105:c002:2:5054:ff:feaa:dbd1.ssh >
2620:105:c000:3:58a4:a8c:71ce:44f9.65532: Flags [S.], seq 3269583768,
ack 4071621245, win 28560, options [mss 1440,sackOK,TS val 577923727
ecr 1,nop,wscale 7], length 0
08:27:14.692847 IP6 2620:105:c002:2:5054:ff:feaa:dbd1.ssh >
2620:105:c000:3:58a4:a8c:71ce:44f9.65532: Flags [S.], seq 3269583768,
ack 4071621245, win 28560, options [mss 1440,sackOK,TS val 577927728
ecr 1,nop,wscale 7], length 0
08:27:22.692861 IP6 2620:105:c002:2:5054:ff:feaa:dbd1.ssh >
2620:105:c000:3:58a4:a8c:71ce:44f9.65532: Flags [S.], seq 3269583768,
ack 4071621245, win 28560, options [mss 1440,sackOK,TS val 577935728
ecr 1,nop,wscale 7], length 0
08:27:22.700595 IP6 2620:105:c000:3:58a4:a8c:71ce:44f9.65532 >
2620:105:c002:2:5054:ff:feaa:dbd1.ssh: Flags [S], seq 4071621244, win
32768, options [mss 1440,nop,wscale 3,sackOK,TS val 37 ecr 0], length
0
08:27:22.700638 IP6 2620:105:c002:2:5054:ff:feaa:dbd1.ssh >
2620:105:c000:3:58a4:a8c:71ce:44f9.65532: Flags [S.], seq 3269583768,
ack 4071621245, win 28560, options [mss 1440,sackOK,TS val 577935735
ecr 1,nop,wscale 7], length 0
08:27:38.699848 IP6 2620:105:c002:2:5054:ff:feaa:dbd1.ssh >
2620:105:c000:3:58a4:a8c:71ce:44f9.65532: Flags [S.], seq 3269583768,
ack 4071621245, win 28560, options [mss 1440,sackOK,TS val 577951735
ecr 1,nop,wscale 7], length 0
08:27:46.716395 IP6 2620:105:c000:3:58a4:a8c:71ce:44f9.65532 >
2620:105:c002:2:5054:ff:feaa:dbd1.ssh: Flags [S], seq 4071621244, win
32768, options [mss 1440,nop,wscale 3,sackOK,TS val 85 ecr 0], length
0
08:27:46.716437 IP6 2620:105:c002:2:5054:ff:feaa:dbd1.ssh >
2620:105:c000:3:58a4:a8c:71ce:44f9.65532: Flags [S.], seq 3269583768,
ack 4071621245, win 28560, options [mss 1440,sackOK,TS val 577959751
ecr 1,nop,wscale 7], length 0
--
Roy Bixler <rcbixler%nyx.net@localhost>
"The fundamental principle of science, the definition almost, is this: the
sole test of the validity of any idea is experiment."
-- Richard P. Feynman
Home |
Main Index |
Thread Index |
Old Index