Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Sep 2022 09:04:29 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 266598] if_ovpn(4) DCO module not supporting correctly IPv6 Traffic Class for tunneled packets
Message-ID:  <bug-266598-227-aYihDtWOQM@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-266598-227@https.bugs.freebsd.org/bugzilla/>
References:  <bug-266598-227@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D266598

--- Comment #9 from Gert Doering <gert@greenie.muc.de> ---
(In reply to Kristof Provost from comment #7)

I have now tested a bit more.  It's... interesting.

Sending a packet with ToS 0x10 (fping6 -O 0x10) into an ovpn(4) interface w=
ill
properly transmit the encapsulated packet to the remote host *but* "tcpdump=
 -n
-i tun7" will not show the packet.

Receiving a packet with ToS 0x10 on an ovpn(4) OpenVPN peer (encrypted pack=
et
coming in from LAN) will neither show the packet on tcpdump, nor receive it
into "FreeBSD stack".

Based on this I have now built a t_client test that will excercise ping tes=
ts
with ToS 0x10, so I can automatedly test if it works or breaks.  Thanks for=
 the
challenge :-)

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-266598-227-aYihDtWOQM>