hallo,

ich habe hier ein eigenartiges verhalten bei dem ich nicht so richtig weiterkomme: IPv6 faehige Rechner, welche einige Minuten keinen IPv6 Traffic gehabt haben und wieder ein Paket versenden wollen, senden die IPv6 Pakete voruebergebend an eine falsche MAC-addresse.

klingt etwas dubios, aber hier mal ein beispiel:

host (linux): ifconfig eth0

eth0      Link encap:Ethernet  HWaddr 00:50:56:95:16:FB
          inet6 addr: 2001:638:902:200f:250:56ff:fe95:16fb/64 Scope:Global
          inet6 addr: fe80::250:56ff:fe95:16fb/64 Scope:Link


gateway (netbsd): ifconfig vlan307

vlan307: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        vlan: 307 parent: wm1
        address: 00:04:23:c1:c4:35
        inet6 fe80::204:23ff:fec1:c435%vlan307 prefixlen 64 scopeid 0xf
        inet6 2001:638:902:200f::1 prefixlen 64


jetzt ein ping6 vom client auf einen beliebigen rechner ausserhalb des netzwerkes:

PING www.ipng.nl(bfib.ipng.nl) 56 data bytes
64 bytes from bfib.ipng.nl: icmp_seq=9 ttl=55 time=34.7 ms

--- www.ipng.nl ping statistics ---
9 packets transmitted, 1 received, 88% packet loss, time 8003ms
rtt min/avg/max/mdev = 34.772/34.772/34.772/0.000 ms


Wie man erkennt, gehen die ersten 8 Pakete verloren, danach kommen ALLE pakete durch. das ipv6 funktioniert jetzt einwandfrei. das angehaengte tcpdump zeigt, dass die ersten 8 Pakte an eine falsche MAC-adresse geschickt werden. danach pegelt sich die sache ein. der effekt tritt bei windows und linux hosts auf. die konfiguration erfolgt stateless mit quagga.

Jemand eine Idee wo man mit der Fehlersuche anfangen kann? Einen Angriff kann ich relativ sicher ausschliessen.


danke
Uwe


hier noch das tcpdump vom host:

16:37:19.367118 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 118: 2001:638:902:200f:250:56ff:fe95:16fb > 2001:7b8:3:1e:290:27ff:fe0c:5c5e: ICMP6, echo request, seq 1, length 64 16:37:20.370703 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 118: 2001:638:902:200f:250:56ff:fe95:16fb > 2001:7b8:3:1e:290:27ff:fe0c:5c5e: ICMP6, echo request, seq 2, length 64 16:37:21.370676 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 118: 2001:638:902:200f:250:56ff:fe95:16fb > 2001:7b8:3:1e:290:27ff:fe0c:5c5e: ICMP6, echo request, seq 3, length 64 16:37:22.370606 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 118: 2001:638:902:200f:250:56ff:fe95:16fb > 2001:7b8:3:1e:290:27ff:fe0c:5c5e: ICMP6, echo request, seq 4, length 64 16:37:23.370575 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 118: 2001:638:902:200f:250:56ff:fe95:16fb > 2001:7b8:3:1e:290:27ff:fe0c:5c5e: ICMP6, echo request, seq 5, length 64 16:37:24.370468 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 86: fe80::250:56ff:fe95:16fb > fe80::204:23ff:fec1:c435: ICMP6, neighbor solicitation, who has fe80::204:23ff:fec1:c435, length 32 16:37:24.370481 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 118: 2001:638:902:200f:250:56ff:fe95:16fb > 2001:7b8:3:1e:290:27ff:fe0c:5c5e: ICMP6, echo request, seq 6, length 64 16:37:25.370440 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 86: fe80::250:56ff:fe95:16fb > fe80::204:23ff:fec1:c435: ICMP6, neighbor solicitation, who has fe80::204:23ff:fec1:c435, length 32 16:37:25.370531 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 118: 2001:638:902:200f:250:56ff:fe95:16fb > 2001:7b8:3:1e:290:27ff:fe0c:5c5e: ICMP6, echo request, seq 7, length 64 16:37:26.370391 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 86: fe80::250:56ff:fe95:16fb > fe80::204:23ff:fec1:c435: ICMP6, neighbor solicitation, who has fe80::204:23ff:fec1:c435, length 32 16:37:26.370470 00:50:56:95:16:fb > 00:04:23:c1:c4:00, ethertype IPv6 (0x86dd), length 118: 2001:638:902:200f:250:56ff:fe95:16fb > 2001:7b8:3:1e:290:27ff:fe0c:5c5e: ICMP6, echo request, seq 8, length 64 16:37:27.380341 00:50:56:95:16:fb > 33:33:ff:c1:c4:35, ethertype IPv6 (0x86dd), length 86: 2001:638:902:200f:250:56ff:fe95:16fb > ff02::1:ffc1:c435: ICMP6, neighbor solicitation, who has fe80::204:23ff:fec1:c435, length 32 16:37:27.380714 00:04:23:c1:c4:35 > 00:50:56:95:16:fb, ethertype IPv6 (0x86dd), length 86: 2001:638:902:200f::1 > 2001:638:902:200f:250:56ff:fe95:16fb: ICMP6, neighbor advertisement, tgt is fe80::204:23ff:fec1:c435, length 32 16:37:27.380744 00:50:56:95:16:fb > 00:04:23:c1:c4:35, ethertype IPv6 (0x86dd), length 118: 2001:638:902:200f:250:56ff:fe95:16fb > 2001:7b8:3:1e:290:27ff:fe0c:5c5e: ICMP6, echo request, seq 9, length 64 16:37:27.405150 00:04:23:c1:c4:35 > 00:50:56:95:16:fb, ethertype IPv6 (0x86dd), length 118: 2001:7b8:3:1e:290:27ff:fe0c:5c5e > 2001:638:902:200f:250:56ff:fe95:16fb: ICMP6, echo reply, seq 9, length 64
-- 
ipv6 mailing list
[email protected]
http://listserv.uni-muenster.de/mailman/listinfo/ipv6

Antwort per Email an