Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    IPV6    |    The convoluted hot-mess that is IPV6    |    4,612 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,632 of 4,612    |
|    Markus Reschke to Tommi Koivula    |
|    "portproxy" in linux    |
|    26 Sep 15 18:16:09    |
      Hello Tommi!              Sep 26 18:33 2015, Tommi Koivula wrote to Markus Reschke:               TK> One log line of dropped inbound binkp:               TK> Sep 26 18:33:16 kernel: DROP <4>DROP IN=v6in4 OUT=         TK>         TK> 6 0:d8:42:50:5a:5b:9b:63:0b:60:00:00:00         TK> TUNNEL=216.66.80.90->91.155.99.11         TK> <1>SRC=2001:0470:1f15:0cb0:0000:0000:0000:0004         TK> DST=2001:0470:0027:000a:0000:0000:0000:0002 <1>LEN=72 TC=0         TK> HOPLIMIT=59 FLOWLBL=0 PROTO=TCP <1>SPT=57521 DPT=24554 SEQ=457283060         TK> ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (0204058C0103030801010402)               TK> 91.155.99.11 is my routers ipv4 address,        TK> 216.66.80.90 is the endpoint of the HE tunnel.        TK> 2001:0470:1f15:0cb0:0000:0000:0000:0004 is where from I tried to         TK> access binkd at 2001:0470:0027:000a:0000:0000:0000:0002              I assume that the router is your end of the 6in4 HE.net tunnel and haproxy is       runing on that router too. Is that right?              In this case you would need to insert an INPUT rule before the logdrop:        ip6tables -t filter -A INPUT -p tcp --destination-port 24554 -j ACCEPT              Regards,       Markus              ---         * Origin: *** theca tabellaria *** (2:240/1661)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca