Date: Sun, 2 Dec 2018 22:21:43 +0200 From: "Reko Turja" <reko.turja@liukuma.net> To: <freebsd-net@freebsd.org> Subject: [SOLVED] Freebsd and 6rd Message-ID: <10EE3E298FE7403489D9A42FAF286DEB@RIVENDELL> In-Reply-To: <0C21716CF5BF4F21B4E45E22BD38208D@RIVENDELL> References: <0C21716CF5BF4F21B4E45E22BD38208D@RIVENDELL>
next in thread | previous in thread | raw e-mail | index | archive | help
-----Original Message-----=20 From: Reko Turja via freebsd-net=20 Sent: Thursday, November 29, 2018 8:28 PM=20 > It seems that if_stf is a no-go due my operator having 2001:2003:: as = a=20 > prefix, and if I've understood it right if_stf needs 2002:: address. I brought over the if_stf from OPNSense; https://github.com/opnsense/src/commit/15acb2f544930c2b6b31896dcaf375cfc8= 4bb064 and I have 6rd setup working now on my router fbsd box :) It would be great if the OPNSense/pfSense patch could be merged = upstream. -Reko From owner-freebsd-net@freebsd.org Sun Dec 2 20:55:45 2018 Return-Path: <owner-freebsd-net@freebsd.org> Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5D166132E168 for <freebsd-net@mailman.ysv.freebsd.org>; Sun, 2 Dec 2018 20:55:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id E90287CFA2 for <freebsd-net@freebsd.org>; Sun, 2 Dec 2018 20:55:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id AC760132E165; Sun, 2 Dec 2018 20:55:44 +0000 (UTC) Delivered-To: net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9AF21132E164 for <net@mailman.ysv.freebsd.org>; Sun, 2 Dec 2018 20:55:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 3AA337CF9D for <net@FreeBSD.org>; Sun, 2 Dec 2018 20:55:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 68397BFE1 for <net@FreeBSD.org>; Sun, 2 Dec 2018 20:55:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id wB2Kthca035391 for <net@FreeBSD.org>; Sun, 2 Dec 2018 20:55:43 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id wB2Kth1G035390 for net@FreeBSD.org; Sun, 2 Dec 2018 20:55:43 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 233341] 12.0-RC1 i386 vnet does not behave like the amd64 vnet version. Date: Sun, 02 Dec 2018 20:55:43 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.0-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: qjail1@a1poweruser.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: <bug-233341-7501-uFd4j7z3LE@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-233341-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-233341-7501@https.bugs.freebsd.org/bugzilla/> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-Rspamd-Queue-Id: E90287CFA2 X-Spamd-Result: default: False [1.19 / 15.00]; local_wl_from(0.00)[freebsd.org]; NEURAL_SPAM_LONG(0.01)[0.010,0]; NEURAL_SPAM_MEDIUM(0.65)[0.653,0]; ASN(0.00)[asn:10310, ipnet:2001:1900:2254::/48, country:US]; NEURAL_SPAM_SHORT(0.52)[0.525,0] X-Rspamd-Server: mx1.freebsd.org X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Networking and TCP/IP with FreeBSD <freebsd-net.freebsd.org> List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-net>, <mailto:freebsd-net-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-net/> List-Post: <mailto:freebsd-net@freebsd.org> List-Help: <mailto:freebsd-net-request@freebsd.org?subject=help> List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-net>, <mailto:freebsd-net-request@freebsd.org?subject=subscribe> X-List-Received-Date: Sun, 02 Dec 2018 20:55:45 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D233341 --- Comment #12 from Joe Barbish <qjail1@a1poweruser.com> --- On the subject of the flooding packets. After many different tcpdumps and device re-cabling have figured out where these packets are coming from. They are originating from android phones and tablets. Unable to determine if this action is normal by design or if those devices have been infected by malwar= e. Those android devices connect by WiFi router that had been bridged to a swi= tch that also has the LAN cable on it. At the switch the unwanted WiFi traffic short cuts to the LAN cable never showing up on the gateway host. Changed the WiFi router cabling layout and enabled the routers firewall add= ing rules to drop the unwanted traffic so it doesn't exit the WiFi router any m= ore. What a learning experience! --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?10EE3E298FE7403489D9A42FAF286DEB>