https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207055
--- Comment #2 from Kristof Provost <k...@freebsd.org> --- I'm still unable to reproduce this. The bug report (and the linked e-mail) suggest that the ICMP6 packet too big packet is rejected because the TCP header it contains has a sequence number which doesn't match the TCP connection. That's why the patch here seems to help: it bypasses the sequence number check. Clearly that's not what we want to do though. The first step is determining if the bug is in pf (incorrectly parsing the ICMP6 packet) or in the router/destination host (generating an incorrect IMCP6 packet). In order to debug this further I'll need the pf rules and a network capture demonstrating the problem. -- You are receiving this mail because: You are the assignee for the bug. _______________________________________________ freebsd-net@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-net To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"