home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   IPV6      The convoluted hot-mess that is IPV6      4,612 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,632 of 4,612   
   Markus Reschke to Tommi Koivula   
   "portproxy" in linux   
   26 Sep 15 18:16:09   
   
   Hello Tommi!   
      
   Sep 26 18:33 2015, Tommi Koivula wrote to Markus Reschke:   
      
    TK> One log line of dropped inbound binkp:   
      
    TK> Sep 26 18:33:16 kernel: DROP  <4>DROP IN=v6in4 OUT=    
    TK>    
    TK> 6 0:d8:42:50:5a:5b:9b:63:0b:60:00:00:00    
    TK> TUNNEL=216.66.80.90->91.155.99.11    
    TK> <1>SRC=2001:0470:1f15:0cb0:0000:0000:0000:0004    
    TK> DST=2001:0470:0027:000a:0000:0000:0000:0002 <1>LEN=72 TC=0    
    TK> HOPLIMIT=59 FLOWLBL=0 PROTO=TCP <1>SPT=57521 DPT=24554 SEQ=457283060    
    TK> ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (0204058C0103030801010402)   
      
    TK> 91.155.99.11 is my routers ipv4 address,   
    TK> 216.66.80.90 is the endpoint of the HE tunnel.   
    TK> 2001:0470:1f15:0cb0:0000:0000:0000:0004 is where from I tried to    
    TK> access binkd at 2001:0470:0027:000a:0000:0000:0000:0002   
      
   I assume that the router is your end of the 6in4 HE.net tunnel and haproxy is   
   runing on that router too. Is that right?   
      
   In this case you would need to insert an INPUT rule before the logdrop:   
    ip6tables -t filter -A INPUT -p tcp --destination-port 24554 -j ACCEPT   
      
   Regards,   
   Markus   
      
   ---    
    * Origin: *** theca tabellaria *** (2:240/1661)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca