https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207055

--- Comment #2 from Kristof Provost <[email protected]> ---
I'm still unable to reproduce this.

The bug report (and the linked e-mail) suggest that the ICMP6 packet too big
packet is rejected because the TCP header it contains has a sequence number
which doesn't match the TCP connection.

That's why the patch here seems to help: it bypasses the sequence number check.
Clearly that's not what we want to do though.

The first step is determining if the bug is in pf (incorrectly parsing the
ICMP6 packet) or in the router/destination host (generating an incorrect IMCP6
packet).

In order to debug this further I'll need the pf rules and a network capture
demonstrating the problem.

-- 
You are receiving this mail because:
You are on the CC list for the bug.
_______________________________________________
[email protected] mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to "[email protected]"

Reply via email to