https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207055
--- Comment #2 from Kristof Provost <[email protected]> --- I'm still unable to reproduce this. The bug report (and the linked e-mail) suggest that the ICMP6 packet too big packet is rejected because the TCP header it contains has a sequence number which doesn't match the TCP connection. That's why the patch here seems to help: it bypasses the sequence number check. Clearly that's not what we want to do though. The first step is determining if the bug is in pf (incorrectly parsing the ICMP6 packet) or in the router/destination host (generating an incorrect IMCP6 packet). In order to debug this further I'll need the pf rules and a network capture demonstrating the problem. -- You are receiving this mail because: You are on the CC list for the bug. _______________________________________________ [email protected] mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-amd64 To unsubscribe, send any mail to "[email protected]"
