Date: Mon, 26 Sep 2022 09:04:29 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 266598] if_ovpn(4) DCO module not supporting correctly IPv6 Traffic Class for tunneled packets Message-ID: <bug-266598-227-aYihDtWOQM@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-266598-227@https.bugs.freebsd.org/bugzilla/> References: <bug-266598-227@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D266598 --- Comment #9 from Gert Doering <gert@greenie.muc.de> --- (In reply to Kristof Provost from comment #7) I have now tested a bit more. It's... interesting. Sending a packet with ToS 0x10 (fping6 -O 0x10) into an ovpn(4) interface w= ill properly transmit the encapsulated packet to the remote host *but* "tcpdump= -n -i tun7" will not show the packet. Receiving a packet with ToS 0x10 on an ovpn(4) OpenVPN peer (encrypted pack= et coming in from LAN) will neither show the packet on tcpdump, nor receive it into "FreeBSD stack". Based on this I have now built a t_client test that will excercise ping tes= ts with ToS 0x10, so I can automatedly test if it works or breaks. Thanks for= the challenge :-) --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-266598-227-aYihDtWOQM>