From owner-freebsd-net@FreeBSD.ORG Thu Jan 8 12:18:14 2015 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 387116F5 for ; Thu, 8 Jan 2015 12:18:14 +0000 (UTC) Received: from valhalla.connectionlost.com.br (valhalla.connectionlost.com.br [131.72.200.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Tiago Felipe Gon????alves", Issuer "Tiago Felipe Gon????alves" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id D904B897 for ; Thu, 8 Jan 2015 12:18:13 +0000 (UTC) Received: from valhalla.connectionlost.com.br (valhalla [131.72.200.69]) by valhalla.connectionlost.com.br (Postfix) with ESMTP id 97596B0D2D for ; Thu, 8 Jan 2015 10:07:37 -0200 (BRST) Authentication-Results: valhalla.connectionlost.com.br; dkim=pass reason="1024-bit key" header.d=connectionlost.com.br header.i=@connectionlost.com.br header.b=IqARuben; dkim-adsp=pass Received: from [186.250.58.220] (unknown [186.250.58.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by valhalla.connectionlost.com.br (Postfix) with ESMTPSA id 17381B0B53 for ; Thu, 8 Jan 2015 10:07:36 -0200 (BRST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=connectionlost.com.br; s=valhalla; t=1420718857; bh=FPHXUQbu1Z9uGTS0Ocks0npJ0hFYCITIwe6EMn9LWhw=; h=Date:From:To:Subject:References:In-Reply-To; b=IqARubenkPodEfg3lqqkt/WsICKJa3uszOZ61UUno9yPjrTlo+ihx+X55IOvCZo2a ybQZ/ErVLT7mqACO/ydlRbsci1sq+vDNxtI2QOeGIKvveP4zl/f6ZeX77Tapw68mZl XHfXDxsGzREga2Qp30vcCmXDFlpNDQ81wJiof/+E= Message-ID: <54AE7332.1070408@connectionlost.com.br> Date: Thu, 08 Jan 2015 10:08:18 -0200 From: Tiago Felipe User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0 MIME-Version: 1.0 To: freebsd-net@freebsd.org Subject: Re: Corrupted IPv6 routing table References: <54ADBDDC.3040901@frasunek.com> <54AE6FF4.6030504@sentex.net> In-Reply-To: <54AE6FF4.6030504@sentex.net> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 8bit X-Virus-Scanned: ClamAV using ClamSMTP X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Jan 2015 12:18:14 -0000 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 I use mpd5 v4 and v6 in freebsd 10.0 and 10.1, I had no problem just like your for now. On 01/08/2015 09:54 AM, Mike Tancsa wrote: > On 1/7/2015 6:14 PM, Przemyslaw Frasunek wrote: >> Dear all, >> >> We are running FreeBSD 9.2-RELEASE-p3 on few PPPoE access >> servers, each servicing about 1000 customers. Each server >> exchanges customers' /32 (for IPv4) and /64 (for IPv6) routes >> using OSPF and BIRD. >> >> Few times in a month, we are experiencing routing table >> corruption, which causes spurious IPv6 routes appearing with >> prefixlen 0: > > I saw this a few yrs ago when I tried mpd with ipv6 after about a > month. There are some threads (i think on freebsd-net) about it and > some of the areas that needed to be fixed. I had to give up on v6 > and mpd as a result. I seem to recall some commits to RELENG_10 > that might had addresses some of the bugs I saw, but thats just > speculation. Have you tried RELENG_10 as an LNS ? > > ---Mike > > - -- ============================================================================= Tiago Felipe Gonçalves. Gerente de Infraestrutura de TI. +55 19 981811543 PGP Fingerprint - A2:82:BD:48:EE:8D:C4:99:C2:4E:81:D4:C4:7B:1C:2E:C7:F3:04:C9 ============================================================================= -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJUrnMuAAoJEMR7HC7H8wTJMXcP/3SGWpZOayZSoFr0eatFu+m7 LskNoUkszQLqy/7L+sGdomPQHi3Cudb+1+PyxKtpWwPcbQJXFyGrB4vxkyzqV5LZ 8te1/Zw0JBD7y9CKE3NswXpbZvggojTyxvr9GVna2rTIa8LQJnxbiVZFnzmcSlq4 fDv/NlPO58qqhI7cXa9JXpbb6wGM/IF5R/f1Hg1LOkf6nEfxalAeDV4R6g37bKgL OS/gcf+33VCQWirnNlCNgJ/rIV9YB5n+5BTj+ZsWpg1W/ZpN00hbttOnqQhpLLPV eLS/vBgjmoxwHWpdjonEpLYVKOuZK3bADeg1u0PuyVT4qCi9t7rzhMMRKlKxWvnv vbIGIt7BtnlnlqbvFvDbHT0GNt0LqcrW3lmTnSV0qbWdbT5oOWVQIQQOBZ5MmDYG cqew8rK0i5dSokYaA4eaQzQDqndVWbwQaiXXm+rAmoG+HsF1602Ez98ilkxjY0DH fCvFGJHhWJgjSKgl+XEMeLEXD/FfWG52n9UmOEEoRsLm2nGnvmtmln61pyjLz/dt InUBS3zu935FXEuveaFZEmbEjdmqEndQOwfF8Xkt8fdvZ8X+wii0Uq6/aq8o3Eib s1iG/LFPHuE2UlMSKj/HqIu5Il3s68xe1zYr2e3fbzwsx/7FMJL9Mrf93IP4UQmP EC2pHoxaqHqDmUYGHC7D =bkKO -----END PGP SIGNATURE-----