search for: icmp6

Displaying 20 results from an estimated 53 matches for "icmp6".

Did you mean: icmp
2008 Sep 03
0
FreeBSD Security Advisory FreeBSD-SA-08:09.icmp6
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-08:09.icmp6 Security Advisory The FreeBSD Project Topic: Remote kernel panics on IPv6 connections Category: core Module: sys_netinet6 Announced: 2008-09-03 Credits: Tom Parker, Bj...
2003 Aug 16
3
-STABLE problems / icmp6.c?
...libcom_err.a /usr/obj/usr/src/i386/usr/lib/libroken.a >> .depend ===> usr.bin/symorder rm -f .depend mkdep -f .depend -a /usr/src/usr.bin/symorder/symorder.c echo symorder: /usr/obj/usr/src/i386/usr/lib/libc.a >> .depend ===> usr.bin/systat make: don't know how to make icmp6.c. Stop *** Error code 2 Stop in /usr/src/usr.bin. *** Error code 1 Stop in /usr/src. *** Error code 1 Stop in /usr/src. *** Error code 1 Stop in /usr/src. root@jasmina> exit --- The last time I built was about 5 days ago, and it worked fine then. Now I wonder if what I'm seeing today...
2017 Feb 23
1
Re: Is it possible to block ipv6 auto configuration entering the tinc tunnel?
...ridge card an now it works. But why is not both rules applied on outgoing traffic?  Thank you so much for your help to get this working :-) Best Regards, Håvard Rabbe root at JOTVPN:~# ip6tables --list-rules -P INPUT ACCEPT -P FORWARD ACCEPT -P OUTPUT ACCEPT -A FORWARD -o bridge -p ipv6-icmp -m icmp6 --icmpv6-type 133 -j DROP -A FORWARD -i bridge -p ipv6-icmp -m icmp6 --icmpv6-type 134 -j DROP On Feb 23, 2017, at 10:48 AM, Guus Sliepen <guus at tinc-vpn.org> wrote: On Wed, Feb 22, 2017 at 08:51:49PM +0000, Håvard Rabbe wrote: thank you for looking in to this. I haven't tried it bef...
2017 Feb 22
2
Re: Is it possible to block ipv6 auto configuration entering the tinc tunnel?
...k you for looking in to this. I haven't tried it before now. I cant get it to work. after running the commands you suggest I get this when I run ip6tables --list-rules root at JOTVPN:~# ip6tables --list-rules -P INPUT ACCEPT -P FORWARD ACCEPT -P OUTPUT ACCEPT -A FORWARD -i vpn -p ipv6-icmp -m icmp6 --icmpv6-type 133 -j DROP -A FORWARD -o vpn -p ipv6-icmp -m icmp6 --icmpv6-type 134 -j DROP Do you have any other ideas? Thanks for your help! Best Regards, Håvard Rabbe On Aug 30, 2016, at 04:39 PM, Guus Sliepen <guus at tinc-vpn.org> wrote: On Sat, Aug 27, 2016 at 11:41:12PM +0000,...
2008 Feb 18
0
[Bug 1441] New: flow record for ICMP6 missing type and code values
https://bugzilla.mindrot.org/show_bug.cgi?id=1441 Summary: flow record for ICMP6 missing type and code values Classification: Unclassified Product: softflowd Version: -current Platform: amd64 OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: softflowd AssignedTo: dj...
2010 Apr 14
1
ipv6 via tinc
...t the server side): mauer:/usr/local/var/open3600-spool# tcpdump ip6 -i fvhglobalnet -n tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on fvhglobalnet, link-type EN10MB (Ethernet), capture size 96 bytes 18:55:07.318963 IP6 fe80::c446:8ff:fea2:724c > ff02::2: ICMP6, router solicitation, length 16 18:55:09.288642 IP6 fe80::c446:8ff:fea2:724c > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 18:55:09.302624 IP6 2001:888:13b3::1.5353 > ff02::fb.5353: 0[|domain] 18:55:10.304354 IP6 2001:888:13b3::1.5353 > ff02::fb.5353: 0[...
2018 Dec 18
0
Multicast (ICMP6 router solicitation) flood
...018 at 11:13:55PM +0100, Lars Kruse wrote: > I am a happy user of tinc in multiple environments. It is beautiful - thank you! > > Today I noticed that a network of around 20 nodes suffered from a flood of > packages like the following: > IP6 fe80::e4eb:74b6:57e0:c3e1 > ff02::2: ICMP6, router solicitation, length 8 [...] > Most of the tinc nodes use v1.0.31. Two use v1.0.24 and a single old one is > still at v1.0.19. > (Debian stable, oldstable and oldoldstable) The issue looks like a routing loop. In fact, there was a bug in versions before 1.0.24 that might cause rou...
2017 Jul 19
1
Re: SSH from host to domain using hostname
...virbr0 using tcpdump. The saved packets are attached in file virbr0.pcap to this email. In my understanding this confirms DHCP request of guest / domain: ld4004:~ # tcpdump -r /tmp/virbr0.pcap reading from file /tmp/virbr0.pcap, link-type EN10MB (Ethernet) 17:10:31.433263 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28 17:10:31.434772 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from 52:54:00:31:dd:59 (oui Unknown), length 300 17:10:31.435007 IP 192.168.100.1.bootps > 192.168.100.52.bootpc: BOOTP/DHCP, Reply, length 313 17:10:31....
2017 Jul 19
2
Re: SSH from host to domain using hostname
...saved packets are attached in file virbr0.pcap to this email. > > In my understanding this confirms DHCP request of guest / domain: > ld4004:~ # tcpdump -r /tmp/virbr0.pcap > reading from file /tmp/virbr0.pcap, link-type EN10MB (Ethernet) > 17:10:31.433263 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), > length 28 > 17:10:31.434772 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from > 52:54:00:31:dd:59 (oui Unknown), length 300 > 17:10:31.435007 IP 192.168.100.1.bootps > 192.168.100.52.bootpc: BOOTP/DHCP, Reply,...
2013 Sep 14
7
[Bug 852] New: IPv6 TEE target sends packets to original IP address on wrong network device
...outer "gw", the following can be observed: # tcpdump -q -n -i eth2 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth2, link-type EN10MB (Ethernet), capture size 65535 bytes 20:01:04.001463 IP6 fe80::21b:21ff:fe2b:e398 > ff02::1:ff00:1: ICMP6, neighbor solicitation, who has fd73:d95d:a475:1000::1, length 32 20:01:04.001751 IP6 fe80::21b:21ff:fe2b:e398 > ff02::1:ff00:17: ICMP6, neighbor solicitation, who has fd73:d95d:a475:c80::17, length 32 20:01:05.000566 IP6 fe80::21b:21ff:fe2b:e398 > ff02::1:ff00:1: ICMP6, neighbor solicita...
2017 Jul 19
6
Re: SSH from host to domain using hostname
18. Juli 2017 16:45, "Michal Privoznik" <mprivozn@redhat.com> schrieb: > On 07/18/2017 04:31 PM, c.monty@web.de wrote: > >> Hello! >> >> I have upgraded all libvirt packages to version 3.5.0-655.1 and restarted host. > > That wasn't necessary. It's not Windows ;-) > >> This is the current default network config: >> ld4004:~
2013 Sep 11
8
[Bug 851] New: IPv6 SNAT target with --random doesn't work
...5d:a475:ffff::1-fd73:d95d:a475:ffff::a # tcpdump -n -i eth1 ip6 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes 20:42:23.210428 IP6 fd73:d95d:a475:ffff::a > fd73:d95d:a475:1000::1: ICMP6, echo request, seq 1, length 64 20:42:23.210704 IP6 fd73:d95d:a475:1000::1 > fd73:d95d:a475:ffff::a: ICMP6, echo reply, seq 1, length 64 20:42:24.209394 IP6 fd73:d95d:a475:ffff::a > fd73:d95d:a475:1000::1: ICMP6, echo request, seq 2, length 64 20:42:24.209669 IP6 fd73:d95d:a475:10...
2018 Dec 14
3
Multicast (ICMP6 router solicitation) flood
Hello, I am a happy user of tinc in multiple environments. It is beautiful - thank you! Today I noticed that a network of around 20 nodes suffered from a flood of packages like the following: IP6 fe80::e4eb:74b6:57e0:c3e1 > ff02::2: ICMP6, router solicitation, length 8 For the first ten hours these nodes (even the usually completely idle ones) have seen incoming traffic of around 1 MBit/s in the tinc interface (and approximately the double bandwidth on the interface that carries the tinc traffic). Then the traffic on the tinc inter...
2017 Feb 23
0
Is it possible to block ipv6 auto configuration entering the tinc tunnel?
...9;t tried it before now. I cant get it to work. > > after running the commands you suggest I get this when I run ip6tables --list-rules > > root at JOTVPN:~# ip6tables --list-rules > -P INPUT ACCEPT > -P FORWARD ACCEPT > -P OUTPUT ACCEPT > -A FORWARD -i vpn -p ipv6-icmp -m icmp6 --icmpv6-type 133 -j DROP > -A FORWARD -o vpn -p ipv6-icmp -m icmp6 --icmpv6-type 134 -j DROP > > Do you have any other ideas? It could be I have the direction of the ICMP messages wrong. Try adding: ip6tables -A FORWARD -o vpn -p ipv6-icmp -m icmp6 --icmpv6-type 133 -j DROP ip6tables -...
2019 Jun 19
2
[Bug 1343] New: With iPv6 masquerade, ICMPv6 time-exceeded pkts are forwarded with bad checksum
...anslation) I get bad checksum. The next hop does not see the packet at all. I looked at nf_nat_proto_icmpv6.c for a bit but so far haven't found much. Kernel 4.9.168. e.g. on ingress: IP6 (hlim 61, next-header ICMPv6 (58) payload length: 80) 2a01:4f9:0:c001::a015 > 2a01:???:????:????::1: [icmp6 sum ok] ICMP6, time exceeded in-transit for fra16s12-in-x04.1e100.net on egress: IP6 (hlim 60, next-header ICMPv6 (58) payload length: 80) 2a01:4f9:0:c001::a015 > fd01:???:????:????::2:1: [bad icmp6 cksum 0x735b -> 0x705b!] ICMP6, time exceeded in-transit for fra16s12-in-x04.1e100.net -- Y...
2012 May 08
6
registry vulnerabilities in R
...pe"="v2.10|Action=Allow|Active=FALSE|Dir=Out|Protocol=1|Profile=Domain|ICMP4=8:*|Name=@FirewallAPI.dll,-28544|Desc=@FirewallAPI.dll,-28547|EmbedCtxt @FirewallAPI.dll,-28502|" HKEY_LOCAL_MACHINE\System\ControlSet001\services\SharedAccess\Defaults\FirewallPolicy\FirewallRules "FPS-ICMP6-ERQ-In-NoScope"="v2.10|Action=Allow|Active=FALSE|Dir=In|Protocol=58|Profile=Domain|ICMP6=128:*|Name=@FirewallAPI.dll,-28545|Desc=@FirewallAPI.dll,-28547|EmbedCtxt @FirewallAPI.dll,-28502|" HKEY_LOCAL_MACHINE\System\ControlSet001\services\SharedAccess\Defaults\FirewallPolicy\FirewallR...
2011 Dec 01
0
Are squeeze Xen dom0 kernels subject to this the same IPv6 GSO problem?
...> 2001:db8:1f1:f240::2.35241: Flags [P.], cksum 0x62d3 (incorrect -> 0x1c84), seq 15709:19993, ack 127, win 9, options [nop,nop,TS val 1771553020 ecr 1086205224], length 4284 23:59:00.672987 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 1240) 2001:db8:0:1f1::8 > 2a00:801:0:11::2: [icmp6 sum ok] ICMP6, packet too big, length 1240, mtu 1500 23:59:00.673161 IP6 (hlim 63, next-header TCP (6) payload length: 32) 2001:db8:1f1:f240::2.35241 > 2a00:801:0:11::2.80: Flags [.], cksum 0x24e4 (correct), ack 17137, win 716, options [nop,nop,TS val 1086205237 ecr 1771553020], length 0 23:59:0...
2011 Dec 13
0
Are Debian squeeze dom0 kernels subject to this same IPv6 GSO problem?
...> 2001:db8:1f1:f240::2.35241: Flags [P.], cksum 0x62d3 (incorrect -> 0x1c84), seq 15709:19993, ack 127, win 9, options [nop,nop,TS val 1771553020 ecr 1086205224], length 4284 23:59:00.672987 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 1240) 2001:db8:0:1f1::8 > 2a00:801:0:11::2: [icmp6 sum ok] ICMP6, packet too big, length 1240, mtu 1500 23:59:00.673161 IP6 (hlim 63, next-header TCP (6) payload length: 32) 2001:db8:1f1:f240::2.35241 > 2a00:801:0:11::2.80: Flags [.], cksum 0x24e4 (correct), ack 17137, win 716, options [nop,nop,TS val 1086205237 ecr 1771553020], length 0 23:59:0...
2005 Jul 01
1
Problem with IPSec tunnel, using IPv6 addresses, between Two FreeBSD systems.....
...ckets from host2 to host1 with ESP(encryption) header. It is shown in the following output: ########## tcpdump at host1 ################### mohan# tcpdump -i xl0 host fe80::2b0:d0ff:fe6f:dfa0 tcpdump: listening on xl0 10:08:43.844723 fe80::2b0:d0ff:fe6f:dfa0[host1] > ff02::1:ff48:7ce7[host2]: icmp6: neighbor sol: who has fe80::2b0:d0ff:fe48:7ce7 10:08:43.845127 fe80::2b0:d0ff:fe48:7ce7 > fe80::2b0:d0ff:fe6f:dfa0: ESP(spi=0x0000fead,seq=0xf) 10:08:44.844736 fe80::2b0:d0ff:fe6f:dfa0 > ff02::1:ff48:7ce7: icmp6: neighbor sol: who has fe80::2b0:d0ff:fe48:7ce7 10:08:44.845109 fe80::2b0:d0...
2005 Jun 30
1
Problem with IPSec tunnel, using IPv6 addresses, between Two FreeBSD systems...?
...ckets from host2 to host1 with ESP(encryption) header. It is shown in the following output: ########## tcpdump at host1 ################### mohan# tcpdump -i xl0 host fe80::2b0:d0ff:fe6f:dfa0 tcpdump: listening on xl0 10:08:43.844723 fe80::2b0:d0ff:fe6f:dfa0[host1] > ff02::1:ff48:7ce7[host2]: icmp6: neighbor sol: who has fe80::2b0:d0ff:fe48:7ce7 10:08:43.845127 fe80::2b0:d0ff:fe48:7ce7 > fe80::2b0:d0ff:fe6f:dfa0: ESP(spi=0x0000fead,seq=0xf) 10:08:44.844736 fe80::2b0:d0ff:fe6f:dfa0 > ff02::1:ff48:7ce7: icmp6: neighbor sol: who has fe80::2b0:d0ff:fe48:7ce7 10:08:44.845109 fe80::2b0:d0...