Hi, sorry, you have right. I have found something terribly wrong with host1. Patch from you works correctly. Many thanks to you. Problem solved.
PS: Host1 was MikroTik device with the current version ROS. This device avoids the second issue. If I change host1 to debian10, everything is fine. Test icmpv6 packet from debian10 to ROS6.48.1 failed after some time as mentioned before. Regards Petr Have a nice day út 12. 10. 2021 v 0:00 odesílatel Matthew Smith <mgsm...@netgate.com> napsal: > > I can't reproduce that issue. > > When you ping from host2 to host1, the hop limit on the echo reply packets > would be set by host1. Is host1 using linux kernel networking? You have > specifically identified that host2 uses "Vpp+LinuxCP" and omitted that > designation from host1, so I presume host1 is not running VPP. If host1 is > using linux kernel networking, you could run tcpdump or wireshark to > inspect outbound packets from 2a01:500:10::1 to 2a01:500:10::2 to confirm > what hop limit is being sset on the echo reply packets sent by host1 to > host2. > > -Matt > > > On Mon, Oct 11, 2021 at 4:13 PM Petr Boltík <petr.bol...@gmail.com> wrote: > >> Hi Matt, >> thank you - tested, but not fully solved. >> IPv4 icmp works fine >> IPv6 icmp >> >> [2a01:500:10::1/64host1]=>ether=>[host2-Vpp+LinuxCP 2a01:500:10::2/64] >> host2=>host1 new issue occur, ttl change to 255 after few icmp6, example >> below >> host1=>host2 works now fine >> >> Regards >> Petr >> >> 64 bytes from 2a01:500:10::1: icmp_seq=12 ttl=64 time=0.269 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=13 ttl=64 time=0.213 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=14 ttl=64 time=0.239 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=15 ttl=64 time=0.210 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=16 ttl=64 time=5.28 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=17 ttl=64 time=0.240 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=18 ttl=255 time=0.268 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=19 ttl=255 time=0.210 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=20 ttl=255 time=0.276 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=21 ttl=255 time=0.484 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=22 ttl=255 time=3.87 ms >>> 64 bytes from 2a01:500:10::1: icmp_seq=23 ttl=255 time=9.34 ms >>> >> >> po 11. 10. 2021 v 21:54 odesílatel Matthew Smith <mgsm...@netgate.com> >> napsal: >> >>> >>> Hi Petr, >>> >>> I don't think it is related to patch 31122, this seems to happen whether >>> you are using that patch or not. Both ip4-icmp-echo-request and >>> ip6-icmp-echo-request set outbound echo replies to have a TTL/hop-limit of >>> 64. The IPv4 node sets the VNET_BUFFER_F_LOCALLY_ORIGINATED flag on the >>> packets it sends but the IPv6 node neglects to do this. Setting that flag >>> will prevent a rewrite node from decrementing the TTL/hop-limit later on. >>> >>> Here's a patch which sets the flag for outbound IPv6 echo replies - >>> https://gerrit.fd.io/r/c/vpp/+/34040. Can you please test it and report >>> whether it solves the problem? >>> >>> Thanks, >>> -Matt >>> >>> >>> On Mon, Oct 11, 2021 at 1:03 PM Petr Boltík <petr.bol...@gmail.com> >>> wrote: >>> >>>> Hi, >>>> I have found an issue with with linux-cp patch 31122. >>>> [192.168.15.1/24 host1]=>ether=>[host2-Vpp+LinuxCP 192.168.15.2/24] >>>> ipv4 icmp TTL >>>> host2=>host1 TTL64 >>>> host1=>host2 TTL64 >>>> >>>> ipv6 icmp TTL: >>>> host2=>host1 TTL64 >>>> host1 =>host2 TTL63 (there should be the same increasing TTL mechanism >>>> as in the ipv4) >>>> >>>> Thanks for report this message to the right hands. >>>> Regards Petr >>>> >>>> >>>> >>>>
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#20314): https://lists.fd.io/g/vpp-dev/message/20314 Mute This Topic: https://lists.fd.io/mt/86243713/21656 Group Owner: vpp-dev+ow...@lists.fd.io Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-