From owner-freebsd-net@freebsd.org Sun Feb 14 17:06:37 2021 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 48710535C9D for ; Sun, 14 Feb 2021 17:06:37 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4Ddtth6GXFz3p1J for ; Sun, 14 Feb 2021 17:06:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id D55B45359F6; Sun, 14 Feb 2021 17:06:36 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id D5237535D8E for ; Sun, 14 Feb 2021 17:06:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Ddtth5Sthz3nrk for ; Sun, 14 Feb 2021 17:06:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id AABF15ED1 for ; Sun, 14 Feb 2021 17:06:36 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 11EH6a7A042127 for ; Sun, 14 Feb 2021 17:06:36 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 11EH6ad4042126 for net@FreeBSD.org; Sun, 14 Feb 2021 17:06:36 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 253469] IPv6 default route vanishes Date: Sun, 14 Feb 2021 17:06:36 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: bin X-Bugzilla-Version: 13.0-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: bz@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 14 Feb 2021 17:06:37 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D253469 Bjoern A. Zeeb changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |bz@FreeBSD.org --- Comment #10 from Bjoern A. Zeeb --- (In reply to courtney.hicks1 from comment #0) To me this sounds that unsolicited RAs (as send out periodically by your router) don't make it while solicited (rtsol "asking") work. That may imply that there are filters somewhere not working properly or multicast is not properly received. If you do see the unsolicited RAs from your router in tcpdump -ln -s0 -i re0 -vvv icmp6 then can you do the following: (0) confirm no firewall active on your local system? (a) wait for the default route to go away (b) do not restart anything! (c) start tcpdump as per above (d) when you see an unsolicited RA coming back in, check (in a 2nd terminal= ) if your default route is back or not. (d1) if it is not; please report (d2) if it is back then stop tcpdump, do an ifconfig re0 promisc; keep watching if your default route goes away again or not during the next 25 minutes and report back. Otherwise and/or in addition sysctl net.inet6.icmp6.nd6_debug=3D0xff may al= so help Alexander to further debug this. --=20 You are receiving this mail because: You are the assignee for the bug.=