https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=266598
--- Comment #8 from Marek Zarychta <[email protected]> --- It looks like packets with traffic class set are invisible to tcpdump(1) but still being sent by ovpn(4) interface. When the DCO side acts as a receiver, such packets are not intercepted by ovpn(4), and thus ssh(1) session breaks when entering interactive mode when ToS is applied also at ssh server side. -- You are receiving this mail because: You are the assignee for the bug.
