[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: iptables MARK breaks radvd



green a écrit :
>>>
>>>  ip6tables -t mangle -A OUTPUT -j MARK --set-mark 0x4/0xf
[...]
> (First, I disabled shaping altogether.)
> Listening with wireshark at a client system.
> 
> Rule in place:
> 1. radvd running
> 2. client connects
> 3. client sends solicitation to ff02::2
> 4. no response
> 5. no advertisements
> 6. manual rdisc6 solicitations time out (with ipv6 address set manually)
> 
> No MARK rule:
> 1. radvd running
> 2. client connects
> 3. client sends solicitation to ff02::2
> 4. server responds with advertisement
> 5. advertisements continue
> 6. manual rdisc6 solicitations are successful
[...]
> Shall I run something to capture at the server?

Yes, it could be helpful to check packets on the bridge interface (br0),
and on the bridge port (eth1, eth2...) the client is connected to.

> Would you like to see some 
> other packets?  Shall I use something other than wireshark?

Wireshark is fine if the server has a GUI. Otherwise tcpdump or tshark
are fine. There are other packet sniffers but these are the ones I use.


Reply to: