Hi,

I'm working in a NAT-PT and I'm having some trouble translating IPv4/IPv6 fragmented 
packets.

I have the following setup:

+--------+ Seg.3 +--------+ Seg.2  +-------+ Seg.1 +-------+
| Host C |-------| NAT-PT |--------|Host B |-------|Host A |
| FreeBSD|       | Linux  |        |FreeBSD|                 |Linux  |
+--------+       +--------+        +-------+       +-------+
           IPv6              IPv4             IPv4
          MTU=1500         MTU=100          MTU=1500       

When host A tries to reach host C, the fragmented packets are apparently well 
translated by the NAT-PT router according to SIIT (RFC 2765). Looking with a sniffer 
in segment 2 and 3, you see that each of the fragments are translated, I don't see any 
error in the new IPv6 packets, but the IPv6 host doesn't seems to reensamble the 
fragments, because the host never sends an ack back.

Whaty could it be happening? could it be an error in the translation procees that we 
haven't found or an issue with the handling of IPv6 fragmented packets in FreeBSD?

Here I send the capture of the first packet and how is translated. The rest of the 
fragments are translated in the same way:

Internet Protocol
Versi�n:4
Header Length: 20 bytes
DSF:0x10
Total Length:100 bytes
Identification: 0x02fc
Flags: 0x02
 0 = Don�t fragment: no set
 1 = More fragments : set
Fragment offset: 0
Time to live: 63
Protocol: TCP (0x06)
Header checksum: 0x95dd (correct)
Source: 192.168.1.2 (192.168.1.2)
Destination: 1.0.0.1 (1.0.0.1)
Transmission Control Protocol
Source Port: telnet (23)
Destination port : 1027
Sequence number : 3853395892
Next sequence number :  3853395940
Acknowledgement number: 3252790475
Header Length: 32 bytes
Flags: 0x0010 (ACK)
Windows size: 32844
Checksum: 0x904b
Options: (12 bytes)
Telnet
Data: vecore\r\n
Data: comcontrol\tifconfig\tmount_cd9660\tnewfs\t\t


Ej. Paquete fragmentado IPv6 traducido.

Internet Protocol Version 6
Version: 6
Traffic Class: 0x00
Flow Level: 0x00000
Payload Length: 88
Next Header: IPv6 Fragment (0x2c)
Hop Limit: 127
Source address: ::192.168.1.2
Destination Address: 3ffe:1ce1:2:0:200::2
Fragmentation Header
Next Header: TCP (0x06)
Offset: 0
More fragments: YES
Identification: 0x000002fc
Transmission Control Protocol
Source Port: telnet (23)
Destination port : 1027
Sequence number : 3853395892
Next sequence number :  3853395940
Acknowledgement number: 3252790475
Header Length: 32 bytes
Flags: 0x0010 (ACK)
Windows size: 32844
Checksum: 0xfd4f
Options: (12 bytes)
Telnet
Data: vecore\r\n
Data: comcontrol\tifconfig\tmount_cd9660\tnewfs\t\t


Thanks for any hint on this.

Cheers,


--
-------------------------------
Juan Luis Baptiste M.
Linux registered user #119248
http://www.merlinux.org

"we're back to the times
 when men were men and
 wrote their own drivers"
        Linus Torvalds
-------------------------------
-- 
______________________________________________
http://www.linuxmail.org/
Now with e-mail forwarding for only US$5.95/yr

Powered by Outblaze
---------------------------------------------------------------------
The IPv6 Users Mailing List
Unsubscribe by sending "unsubscribe users" to [EMAIL PROTECTED]

Reply via email to