[Bug 266598] if_ovpn(4) DCO module not supporting correctly IPv6 tunneling
Date: Mon, 26 Sep 2022 06:52:01 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=266598 --- Comment #4 from Gert Doering <gert@greenie.muc.de> --- OK, so this seems to be TOS related - the "packet not getting through" is the first one to show "class 0x10". 08:42:29.940180 IP6 (flowlabel 0x8e0f2, hlim 64, next-header TCP (6) payload length: 76) fd00:abcd:114:2::1.22 > fd00:abcd:114:2::1001.54734: Flags [P.], cksum 0x3223 (correct), seq 2627:2671, ack 2086, win 1042, options [nop,nop,TS val 1553137522 ecr 3728584529], length 44 08:42:29.940212 IP6 (flowlabel 0x4302d, hlim 64, next-header TCP (6) payload length: 32) fd00:abcd:114:2::1001.54734 > fd00:abcd:114:2::1.22: Flags [.], cksum 0x9f30 (correct), ack 2671, win 501, options [nop,nop,TS val 3728584530 ecr 1553137522], length 0 08:42:29.940420 IP6 (class 0x10, flowlabel 0x4302d, hlim 64, next-header TCP (6) payload length: 588) fd00:abcd:114:2::1001.54734 > fd00:abcd:114:2::1.22: Flags [P.], cksum 0xe2c7 (correct), seq 2086:2642, ack 2671, win 501, options [nop,nop,TS val 3728584530 ecr 1553137522], length 556 08:42:30.152235 IP6 (class 0x10, flowlabel 0x4302d, hlim 64, next-header TCP (6) payload length: 588) fd00:abcd:114:2::1001.54734 > fd00:abcd:114:2::1.22: Flags [P.], cksum 0xe1f3 (correct), seq 2086:2642, ack 2671, win 501, options [nop,nop,TS val 3728584742 ecr 1553137522], length 556 08:42:30.364255 IP6 (class 0x10, flowlabel 0x03eee, hlim 64, next-header TCP (6) payload length: 588) fd00:abcd:114:2::1001.54734 > fd00:abcd:114:2::1.22: Flags [P.], cksum 0xe11f (correct), seq 2086:2642, ack 2671, win 501, options [nop,nop,TS val 3728584954 ecr 1553137522], length 556 ... but that might be a red herring... calling "ssh -o 'ipqos 0' ..." will result in the same stall, but no more "class 0x10". Mmmh. -- You are receiving this mail because: You are the assignee for the bug.