[PVE-User] PX4 and IPv6

Guillaume proxmox at shadowprojects.org
Thu Aug 18 16:16:11 CEST 2016


* Ping on working container

** Host
~# tcpdump -i vmbr0 -vn 'icmp6'
tcpdump: listening on vmbr0, link-type EN10MB (Ethernet), capture size 
262144 bytes
16:07:41.527990 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 
32) fe80::ec4:7aff:fec4:e422 > 2001:41d0:1008:1cff:ff:ff:ff:ff: [icmp6 
sum ok] ICMP6, neighbor solicitation, length 32, who has 
2001:41d0:1008:1cff:ff:ff:ff:ff
           source link-address option (1), length 8 (1): 
0c:c4:7a:c4:e4:22
16:07:41.529863 IP6 (class 0xe0, hlim 255, next-header ICMPv6 (58) 
payload length: 24) 2001:41d0:1008:1cff:ff:ff:ff:ff > 
fe80::ec4:7aff:fec4:e422: [icmp6 sum ok] ICMP6, neighbor advertisement, 
length 24, tgt is 2001:41d0:1008:1cff:ff:ff:ff:ff, Flags [router, 
solicited]
16:07:49.499164 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::101: [icmp6 sum ok] 
ICMP6, echo request, seq 1
16:07:49.499204 IP6 (flowlabel 0x43bf1, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::101 > 2001:41d0:1:c705::1: 
[icmp6 sum ok] ICMP6, echo reply, seq 1
16:07:50.498126 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::101: [icmp6 sum ok] 
ICMP6, echo request, seq 2
16:07:50.498212 IP6 (flowlabel 0x43bf1, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::101 > 2001:41d0:1:c705::1: 
[icmp6 sum ok] ICMP6, echo reply, seq 2
16:07:51.497400 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::101: [icmp6 sum ok] 
ICMP6, echo request, seq 3
16:07:51.497488 IP6 (flowlabel 0x43bf1, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::101 > 2001:41d0:1:c705::1: 
[icmp6 sum ok] ICMP6, echo reply, seq 3
16:07:52.497334 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::101: [icmp6 sum ok] 
ICMP6, echo request, seq 4
16:07:52.497370 IP6 (flowlabel 0x43bf1, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::101 > 2001:41d0:1:c705::1: 
[icmp6 sum ok] ICMP6, echo reply, seq 4
16:07:53.497391 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::101: [icmp6 sum ok] 
ICMP6, echo request, seq 5
16:07:53.497466 IP6 (flowlabel 0x43bf1, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::101 > 2001:41d0:1:c705::1: 
[icmp6 sum ok] ICMP6, echo reply, seq 5

** Working container
~# tcpdump -i eth0 -vn 'icmp6'
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 
262144 bytes
16:07:49.499180 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::101: [icmp6 sum ok] 
ICMP6, echo request, seq 1
16:07:49.499201 IP6 (flowlabel 0x43bf1, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::101 > 2001:41d0:1:c705::1: 
[icmp6 sum ok] ICMP6, echo reply, seq 1
16:07:50.498162 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::101: [icmp6 sum ok] 
ICMP6, echo request, seq 2
16:07:50.498204 IP6 (flowlabel 0x43bf1, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::101 > 2001:41d0:1:c705::1: 
[icmp6 sum ok] ICMP6, echo reply, seq 2
16:07:51.497437 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::101: [icmp6 sum ok] 
ICMP6, echo request, seq 3
16:07:51.497479 IP6 (flowlabel 0x43bf1, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::101 > 2001:41d0:1:c705::1: 
[icmp6 sum ok] ICMP6, echo reply, seq 3
16:07:52.497347 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::101: [icmp6 sum ok] 
ICMP6, echo request, seq 4
16:07:52.497366 IP6 (flowlabel 0x43bf1, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::101 > 2001:41d0:1:c705::1: 
[icmp6 sum ok] ICMP6, echo reply, seq 4
16:07:53.497420 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::101: [icmp6 sum ok] 
ICMP6, echo request, seq 5
16:07:53.497457 IP6 (flowlabel 0x43bf1, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::101 > 2001:41d0:1:c705::1: 
[icmp6 sum ok] ICMP6, echo reply, seq 5



* Ping on non-working container

** Host
~# tcpdump -i vmbr0 -vn 'icmp6'
tcpdump: listening on vmbr0, link-type EN10MB (Ethernet), capture size 
262144 bytes
16:09:17.759338 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 1
16:09:18.767425 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 2
16:09:19.775638 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 3
16:09:20.783664 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 4
16:09:21.791381 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 5
16:09:22.799456 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 6

** Non-working container
~# tcpdump -i eth0 -vn 'icmp6'
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 
262144 bytes
16:09:17.759380 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 1
16:09:18.767460 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 2
16:09:19.775655 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 3
16:09:20.783699 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 4
16:09:21.791399 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 5
16:09:22.799492 IP6 (hlim 61, next-header ICMPv6 (58) payload length: 
64) 2001:41d0:1:c705::1 > 2001:41d0:1007:1c79::102: [icmp6 sum ok] 
ICMP6, echo request, seq 6



* Ping on non-working container FROM proxmox host

** Host
~# tcpdump -i vmbr0 -vn 'icmp6'
tcpdump: listening on vmbr0, link-type EN10MB (Ethernet), capture size 
262144 bytes
16:14:30.680225 IP6 (flowlabel 0x442a0, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79:: > 2001:41d0:1007:1c79::102: 
[icmp6 sum ok] ICMP6, echo request, seq 1
16:14:30.680258 IP6 (flowlabel 0xbe6a9, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::102 > 2001:41d0:1007:1c79::: 
[icmp6 sum ok] ICMP6, echo reply, seq 1
16:14:31.680013 IP6 (flowlabel 0x442a0, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79:: > 2001:41d0:1007:1c79::102: 
[icmp6 sum ok] ICMP6, echo request, seq 2
16:14:31.680046 IP6 (flowlabel 0xbe6a9, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::102 > 2001:41d0:1007:1c79::: 
[icmp6 sum ok] ICMP6, echo reply, seq 2
16:14:32.679999 IP6 (flowlabel 0x442a0, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79:: > 2001:41d0:1007:1c79::102: 
[icmp6 sum ok] ICMP6, echo request, seq 3
16:14:32.680028 IP6 (flowlabel 0xbe6a9, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::102 > 2001:41d0:1007:1c79::: 
[icmp6 sum ok] ICMP6, echo reply, seq 3
16:14:33.680058 IP6 (flowlabel 0x442a0, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79:: > 2001:41d0:1007:1c79::102: 
[icmp6 sum ok] ICMP6, echo request, seq 4
16:14:33.680122 IP6 (flowlabel 0xbe6a9, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::102 > 2001:41d0:1007:1c79::: 
[icmp6 sum ok] ICMP6, echo reply, seq 4


** Non-working container
# tcpdump -i eth0 -vn 'icmp6'
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 
262144 bytes
16:14:30.680236 IP6 (flowlabel 0x442a0, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79:: > 2001:41d0:1007:1c79::102: 
[icmp6 sum ok] ICMP6, echo request, seq 1
16:14:30.680255 IP6 (flowlabel 0xbe6a9, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::102 > 2001:41d0:1007:1c79::: 
[icmp6 sum ok] ICMP6, echo reply, seq 1
16:14:31.680024 IP6 (flowlabel 0x442a0, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79:: > 2001:41d0:1007:1c79::102: 
[icmp6 sum ok] ICMP6, echo request, seq 2
16:14:31.680043 IP6 (flowlabel 0xbe6a9, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::102 > 2001:41d0:1007:1c79::: 
[icmp6 sum ok] ICMP6, echo reply, seq 2
16:14:32.680008 IP6 (flowlabel 0x442a0, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79:: > 2001:41d0:1007:1c79::102: 
[icmp6 sum ok] ICMP6, echo request, seq 3
16:14:32.680026 IP6 (flowlabel 0xbe6a9, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::102 > 2001:41d0:1007:1c79::: 
[icmp6 sum ok] ICMP6, echo reply, seq 3
16:14:33.680076 IP6 (flowlabel 0x442a0, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79:: > 2001:41d0:1007:1c79::102: 
[icmp6 sum ok] ICMP6, echo request, seq 4
16:14:33.680115 IP6 (flowlabel 0xbe6a9, hlim 64, next-header ICMPv6 (58) 
payload length: 64) 2001:41d0:1007:1c79::102 > 2001:41d0:1007:1c79::: 
[icmp6 sum ok] ICMP6, echo reply, seq 4


Le 18-08-2016 15:28, Wolfgang Bumiller a écrit :
> A couple notes:
> -) Please disable automatic line breaks in your mail client when 
> sending
> dumps like that as that just makes it too hard to read
> -) Ideally you just use 'ping' and filter by 'icmp6' instead of 'ip6'
> (and perhaps include the options '-vn' in tcpdump). Because for any
> other protocol the problem would usually be a different one (firewall,
> or the server simply not listening on ipv6)
> 
> It looks like your conatiner is seeing the SYN packets and is not
> responding. Can you check the running network settings (not the
> configuration from /etc) via `# ip -6 addr` and `# ip -6 route` and 
> make
> sure the http server is actually listening (eg. via `# ss -tlnp6`).
> Maybe stick to pinging to rule out server configuration issues. (Iow.
> check the tcpdump of a `ping6` instead of http like mentioned above).
> 
> On Thu, Aug 18, 2016 at 11:21:09AM +0200, Guillaume wrote:
> [removed linebreaks]
>> - It is the same setup, i checked twice.
>> - It is a routed setup on an OVH server indeed. NDP entries are on 
>> each
>> firewall (lxc, node and datacenter).
>> 
>> Maybe a reboot would help, but i'm trying to avoid that for the 
>> moment.
>> 
>> Here is the tcpdump logs, there seems to be no reply to the ipv6 
>> requests as
>> they are showing on the container :
>> * Port 80 on working ipv6 container (2001:41d0:1007:1c79::101)
>> 
>> ** host
>> ~# tcpdump -i vmbr0 ip6
>> tcpdump: verbose output suppressed, use -v or -vv for full protocol 
>> decode listening on vmbr0, link-type EN10MB (Ethernet), capture size 
>> 262144 bytes
>> 11:14:31.188568 IP6 fe80::caf9:f9ff:fe58:fb00.2029 > ff02::66.2029: 
>> UDP, length 72
>> 11:14:31.536156 IP6 fe80::6e50:4dff:feae:a900.2029 > ff02::66.2029: 
>> UDP, length 72
>> 11:14:35.828631 IP6 fe80::caf9:f9ff:fe58:fb00 > ff02::5: OSPFv3, 
>> Hello, length 36
>> 11:14:37.568228 IP6 fe80::6e50:4dff:feae:a900.2029 > ff02::66.2029: 
>> UDP, length 6
>> 11:14:41.186066 IP6 2607:f2f8:a8e0::2.31183 > 
>> 2001:41d0:1007:1c79::101.http: Flags [S], seq 4010901551, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243609104 ecr 0], length 
>> 0
>> 11:14:41.186191 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.31183: Flags [S.], seq 2044967707, ack 4010901552, 
>> win 28560, options [mss 1440,sackOK,TS val 182595146 ecr 
>> 3243609104,nop,wscale 7], length 0
>> 11:14:41.334748 IP6 2607:f2f8:a8e0::2.31183 > 
>> 2001:41d0:1007:1c79::101.http: Flags [.], ack 1, win 1026, options 
>> [nop,nop,TS val 3243609254 ecr 182595146], length 0
>> 11:14:41.334927 IP6 2607:f2f8:a8e0::2.31183 > 
>> 2001:41d0:1007:1c79::101.http: Flags [F.], seq 1, ack 1, win 1026, 
>> options [nop,nop,TS val 3243609254 ecr 182595146], length 0
>> 11:14:41.334981 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.31183: Flags [F.], seq 1, ack 2, win 224, options 
>> [nop,nop,TS val 182595183 ecr 3243609254], length 0
>> 11:14:41.338075 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [S], seq 2137551393, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243609254 ecr 0], length 
>> 0
>> 11:14:41.338186 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.22591: Flags [S.], seq 2213057153, ack 2137551394, 
>> win 28560, options [mss 1440,sackOK,TS val 182595184 ecr 
>> 3243609254,nop,wscale 7], length 0
>> 11:14:41.489349 IP6 2607:f2f8:a8e0::2.31183 > 
>> 2001:41d0:1007:1c79::101.http: Flags [.], ack 2, win 1026, options 
>> [nop,nop,TS val 3243609406 ecr 182595183], length 0
>> 11:14:41.497826 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [.], ack 1, win 1026, options 
>> [nop,nop,TS val 3243609410 ecr 182595184], length 0
>> 11:14:41.497928 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [P.], seq 1:68, ack 1, win 1026, 
>> options [nop,nop,TS val 3243609410 ecr 182595184], length 67
>> 11:14:41.497965 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.22591: Flags [.], ack 68, win 224, options 
>> [nop,nop,TS val 182595224 ecr 3243609410], length 0
>> 11:14:41.498094 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.22591: Flags [P.], seq 1:2273, ack 68, win 224, 
>> options [nop,nop,TS val 182595224 ecr 3243609410], length 2272
>> 11:14:41.498163 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.22591: Flags [FP.], seq 2273:2451, ack 68, win 224, 
>> options [nop,nop,TS val 182595224 ecr 3243609410], length 178
>> 11:14:41.648498 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [.], ack 2273, win 990, options 
>> [nop,nop,TS val 3243609567 ecr 182595224], length 0
>> 11:14:41.648527 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [.], ack 2452, win 988, options 
>> [nop,nop,TS val 3243609567 ecr 182595224], length 0
>> 11:14:41.696559 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [F.], seq 68, ack 2452, win 1026, 
>> options [nop,nop,TS val 3243609610 ecr 182595224], length 0
>> 11:14:41.696641 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.22591: Flags [.], ack 69, win 224, options 
>> [nop,nop,TS val 182595274 ecr 3243609610], length 0
>> 11:14:42.175057 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [S], seq 1761752329, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243610093 ecr 0], length 
>> 0
>> 11:14:42.175124 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [S.], seq 477212830, ack 1761752330, 
>> win 28560, options [mss 1440,sackOK,TS val 182595393 ecr 
>> 3243610093,nop,wscale 7], length 0
>> 11:14:42.325261 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 1, win 1026, options 
>> [nop,nop,TS val 3243610243 ecr 182595393], length 0
>> 11:14:42.325422 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [P.], seq 1:518, ack 1, win 
>> 1026, options [nop,nop,TS val 3243610243 ecr 182595393], length 517
>> 11:14:42.325466 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], ack 518, win 232, options 
>> [nop,nop,TS val 182595431 ecr 3243610243], length 0
>> 11:14:42.333811 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 1:2857, ack 518, win 232, 
>> options [nop,nop,TS val 182595433 ecr 3243610243], length 2856
>> 11:14:42.333823 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [P.], seq 2857:3449, ack 518, win 232, 
>> options [nop,nop,TS val 182595433 ecr 3243610243], length 592
>> 11:14:42.483345 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 2857, win 981, options 
>> [nop,nop,TS val 3243610401 ecr 182595433], length 0
>> 11:14:42.487568 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [P.], seq 518:676, ack 3449, win 
>> 1026, options [nop,nop,TS val 3243610401 ecr 182595433], length 158
>> 11:14:42.488817 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [P.], seq 3449:3707, ack 676, win 240, 
>> options [nop,nop,TS val 182595472 ecr 3243610401], length 258
>> 11:14:42.637407 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [P.], seq 676:775, ack 3707, win 
>> 1026, options [nop,nop,TS val 3243610555 ecr 182595472], length 99
>> 11:14:42.675992 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], ack 775, win 240, options 
>> [nop,nop,TS val 182595519 ecr 3243610555], length 0
>> 11:14:42.805947 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 3707:6563, ack 775, win 240, 
>> options [nop,nop,TS val 182595551 ecr 3243610555], length 2856
>> 11:14:42.805959 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 6563:9419, ack 775, win 240, 
>> options [nop,nop,TS val 182595551 ecr 3243610555], length 2856
>> 11:14:42.805964 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 9419:12275, ack 775, win 240, 
>> options [nop,nop,TS val 182595551 ecr 3243610555], length 2856
>> 11:14:42.805973 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 12275:15131, ack 775, win 240, 
>> options [nop,nop,TS val 182595551 ecr 3243610555], length 2856
>> 11:14:42.805979 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 15131:17987, ack 775, win 240, 
>> options [nop,nop,TS val 182595551 ecr 3243610555], length 2856
>> 11:14:42.955114 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 6563, win 1004, options 
>> [nop,nop,TS val 3243610873 ecr 182595551], length 0
>> 11:14:42.955143 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 9419, win 959, options 
>> [nop,nop,TS val 3243610873 ecr 182595551], length 0
>> 11:14:42.955149 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 12275, win 1004, 
>> options [nop,nop,TS val 3243610873 ecr 182595551], length 0
>> 11:14:42.955255 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 17987:20843, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955259 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 20843:23699, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955261 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 23699:26555, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955264 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 26555:29411, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955267 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 29411:32267, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955270 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 32267:35123, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955325 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 15131, win 959, options 
>> [nop,nop,TS val 3243610873 ecr 182595551], length 0
>> 11:14:42.955359 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 35123:37979, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955362 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [FP.], seq 37979:39228, ack 775, win 
>> 240, options [nop,nop,TS val 182595588 ecr 3243610873], length 1249
>> 11:14:42.955415 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 17987, win 914, options 
>> [nop,nop,TS val 3243610873 ecr 182595551], length 0
>> 11:14:43.103510 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 20843, win 981, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.103673 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 23699, win 937, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.104046 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 26555, win 892, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.105628 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 29411, win 847, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.105637 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 32267, win 803, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.105639 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 35123, win 791, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.105820 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 37979, win 747, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.105878 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 39229, win 727, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.208472 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 39229, win 1025, 
>> options [nop,nop,TS val 3243611120 ecr 182595588], length 0
>> 11:14:43.220423 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [F.], seq 775, ack 39229, win 
>> 1026, options [nop,nop,TS val 3243611130 ecr 182595588], length 0
>> 11:14:43.220498 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], ack 776, win 240, options 
>> [nop,nop,TS val 182595655 ecr 3243611130], length 0
>> 11:14:44.060317 IP6 fe80::6e50:4dff:feae:a900.2029 > ff02::66.2029: 
>> UDP, length 72
>> 11:14:44.920621 IP6 fe80::caf9:f9ff:fe58:fb00.2029 > ff02::66.2029: 
>> UDP, length 72
>> 11:14:45.500748 IP6 fe80::caf9:f9ff:fe58:fb00 > ff02::5: OSPFv3, 
>> Hello, length 36
>> 
>> ** container
>> ~# tcpdump -i eth0 ip6
>> tcpdump: verbose output suppressed, use -v or -vv for full protocol 
>> decode listening on eth0, link-type EN10MB (Ethernet), capture size 
>> 262144 bytes
>> 11:14:41.186126 IP6 2607:f2f8:a8e0::2.31183 > 
>> 2001:41d0:1007:1c79::101.http: Flags [S], seq 4010901551, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243609104 ecr 0], length 
>> 0
>> 11:14:41.186181 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.31183: Flags [S.], seq 2044967707, ack 4010901552, 
>> win 28560, options [mss 1440,sackOK,TS val 182595146 ecr 
>> 3243609104,nop,wscale 7], length 0
>> 11:14:41.334787 IP6 2607:f2f8:a8e0::2.31183 > 
>> 2001:41d0:1007:1c79::101.http: Flags [.], ack 1, win 1026, options 
>> [nop,nop,TS val 3243609254 ecr 182595146], length 0
>> 11:14:41.334936 IP6 2607:f2f8:a8e0::2.31183 > 
>> 2001:41d0:1007:1c79::101.http: Flags [F.], seq 1, ack 1, win 1026, 
>> options [nop,nop,TS val 3243609254 ecr 182595146], length 0
>> 11:14:41.334965 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.31183: Flags [F.], seq 1, ack 2, win 224, options 
>> [nop,nop,TS val 182595183 ecr 3243609254], length 0
>> 11:14:41.338129 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [S], seq 2137551393, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243609254 ecr 0], length 
>> 0
>> 11:14:41.338177 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.22591: Flags [S.], seq 2213057153, ack 2137551394, 
>> win 28560, options [mss 1440,sackOK,TS val 182595184 ecr 
>> 3243609254,nop,wscale 7], length 0
>> 11:14:41.489387 IP6 2607:f2f8:a8e0::2.31183 > 
>> 2001:41d0:1007:1c79::101.http: Flags [.], ack 2, win 1026, options 
>> [nop,nop,TS val 3243609406 ecr 182595183], length 0
>> 11:14:41.497862 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [.], ack 1, win 1026, options 
>> [nop,nop,TS val 3243609410 ecr 182595184], length 0
>> 11:14:41.497940 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [P.], seq 1:68, ack 1, win 1026, 
>> options [nop,nop,TS val 3243609410 ecr 182595184], length 67: HTTP: 
>> GET / HTTP/1.0
>> 11:14:41.497958 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.22591: Flags [.], ack 68, win 224, options 
>> [nop,nop,TS val 182595224 ecr 3243609410], length 0
>> 11:14:41.498071 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.22591: Flags [P.], seq 1:2273, ack 68, win 224, 
>> options [nop,nop,TS val 182595224 ecr 3243609410], length 2272: HTTP: 
>> HTTP/1.1 301 Moved Permanently
>> 11:14:41.498138 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.22591: Flags [FP.], seq 2273:2451, ack 68, win 224, 
>> options [nop,nop,TS val 182595224 ecr 3243609410], length 178: HTTP
>> 11:14:41.648538 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [.], ack 2273, win 990, options 
>> [nop,nop,TS val 3243609567 ecr 182595224], length 0
>> 11:14:41.648541 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [.], ack 2452, win 988, options 
>> [nop,nop,TS val 3243609567 ecr 182595224], length 0
>> 11:14:41.696591 IP6 2607:f2f8:a8e0::2.22591 > 
>> 2001:41d0:1007:1c79::101.http: Flags [F.], seq 68, ack 2452, win 1026, 
>> options [nop,nop,TS val 3243609610 ecr 182595224], length 0
>> 11:14:41.696623 IP6 2001:41d0:1007:1c79::101.http > 
>> 2607:f2f8:a8e0::2.22591: Flags [.], ack 69, win 224, options 
>> [nop,nop,TS val 182595274 ecr 3243609610], length 0
>> 11:14:42.175090 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [S], seq 1761752329, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243610093 ecr 0], length 
>> 0
>> 11:14:42.175120 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [S.], seq 477212830, ack 1761752330, 
>> win 28560, options [mss 1440,sackOK,TS val 182595393 ecr 
>> 3243610093,nop,wscale 7], length 0
>> 11:14:42.325299 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 1, win 1026, options 
>> [nop,nop,TS val 3243610243 ecr 182595393], length 0
>> 11:14:42.325437 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [P.], seq 1:518, ack 1, win 
>> 1026, options [nop,nop,TS val 3243610243 ecr 182595393], length 517
>> 11:14:42.325458 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], ack 518, win 232, options 
>> [nop,nop,TS val 182595431 ecr 3243610243], length 0
>> 11:14:42.333798 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 1:2857, ack 518, win 232, 
>> options [nop,nop,TS val 182595433 ecr 3243610243], length 2856
>> 11:14:42.333820 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [P.], seq 2857:3449, ack 518, win 232, 
>> options [nop,nop,TS val 182595433 ecr 3243610243], length 592
>> 11:14:42.483362 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 2857, win 981, options 
>> [nop,nop,TS val 3243610401 ecr 182595433], length 0
>> 11:14:42.487600 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [P.], seq 518:676, ack 3449, win 
>> 1026, options [nop,nop,TS val 3243610401 ecr 182595433], length 158
>> 11:14:42.488804 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [P.], seq 3449:3707, ack 676, win 240, 
>> options [nop,nop,TS val 182595472 ecr 3243610401], length 258
>> 11:14:42.637441 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [P.], seq 676:775, ack 3707, win 
>> 1026, options [nop,nop,TS val 3243610555 ecr 182595472], length 99
>> 11:14:42.675950 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], ack 775, win 240, options 
>> [nop,nop,TS val 182595519 ecr 3243610555], length 0
>> 11:14:42.805930 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 3707:6563, ack 775, win 240, 
>> options [nop,nop,TS val 182595551 ecr 3243610555], length 2856
>> 11:14:42.805956 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 6563:9419, ack 775, win 240, 
>> options [nop,nop,TS val 182595551 ecr 3243610555], length 2856
>> 11:14:42.805962 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 9419:12275, ack 775, win 240, 
>> options [nop,nop,TS val 182595551 ecr 3243610555], length 2856
>> 11:14:42.805971 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 12275:15131, ack 775, win 240, 
>> options [nop,nop,TS val 182595551 ecr 3243610555], length 2856
>> 11:14:42.805977 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 15131:17987, ack 775, win 240, 
>> options [nop,nop,TS val 182595551 ecr 3243610555], length 2856
>> 11:14:42.955158 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 6563, win 1004, options 
>> [nop,nop,TS val 3243610873 ecr 182595551], length 0
>> 11:14:42.955209 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 17987:20843, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955217 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 20843:23699, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955161 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 9419, win 959, options 
>> [nop,nop,TS val 3243610873 ecr 182595551], length 0
>> 11:14:42.955230 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 23699:26555, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955235 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], seq 26555:29411, ack 775, win 240, 
>> options [nop,nop,TS val 182595588 ecr 3243610873], length 2856
>> 11:14:42.955164 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 12275, win 1004, 
>> options [nop,nop,TS val 3243610873 ecr 182595551], length 0
>> 11:14:43.103533 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 20843, win 981, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.103678 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 23699, win 937, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.104058 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 26555, win 892, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.105642 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 29411, win 847, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.105643 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 32267, win 803, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.105644 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 35123, win 791, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.105833 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 37979, win 747, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.105883 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 39229, win 727, options 
>> [nop,nop,TS val 3243611022 ecr 182595588], length 0
>> 11:14:43.208484 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [.], ack 39229, win 1025, 
>> options [nop,nop,TS val 3243611120 ecr 182595588], length 0
>> 11:14:43.220453 IP6 2607:f2f8:a8e0::2.22592 > 
>> 2001:41d0:1007:1c79::101.https: Flags [F.], seq 775, ack 39229, win 
>> 1026, options [nop,nop,TS val 3243611130 ecr 182595588], length 0
>> 11:14:43.220490 IP6 2001:41d0:1007:1c79::101.https > 
>> 2607:f2f8:a8e0::2.22592: Flags [.], ack 776, win 240, options 
>> [nop,nop,TS val 182595655 ecr 3243611130], length 0
>> 
>> 
>> * Port 80 on non-working ipv6 container (2001:41d0:1007:1c79::102)
>> 
>> ** host
>> ~# tcpdump -i vmbr0 'ip6'
>> tcpdump: verbose output suppressed, use -v or -vv for full protocol 
>> decode listening on vmbr0, link-type EN10MB (Ethernet), capture size 
>> 262144 bytes
>> 11:17:26.256927 IP6 fe80::caf9:f9ff:fe58:fb00 > ff02::5: OSPFv3, 
>> Hello, length 36
>> 11:17:26.557307 IP6 fe80::caf9:f9ff:fe58:fb00.2029 > ff02::66.2029: 
>> UDP, length 72
>> 11:17:29.002166 IP6 2607:f2f8:a8e0::2.35835 > 
>> 2001:41d0:1007:1c79::102.http: Flags [S], seq 2186876053, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243776920 ecr 0], length 
>> 0
>> 11:17:31.021729 IP6 2607:f2f8:a8e0::2.35836 > 
>> 2001:41d0:1007:1c79::102.http: Flags [S], seq 27613106, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243778940 ecr 0], length 
>> 0
>> 11:17:31.366822 IP6 fe80::6e50:4dff:feae:a900.2029 > ff02::66.2029: 
>> UDP, length 72
>> 11:17:33.430904 IP6 2607:f2f8:a8e0::2.35838 > 
>> 2001:41d0:1007:1c79::102.https: Flags [S], seq 4010892160, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243781350 ecr 0], length 
>> 0
>> 11:17:35.664950 IP6 fe80::caf9:f9ff:fe58:fb00 > ff02::5: OSPFv3, 
>> Hello, length 36
>> 11:17:36.029938 IP6 2607:f2f8:a8e0::2.35840 > 
>> 2001:41d0:1007:1c79::102.https: Flags [S], seq 1369235300, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243783940 ecr 0], length 
>> 0
>> 11:17:41.160933 IP6 fe80::caf9:f9ff:fe58:fb00.2029 > ff02::66.2029: 
>> UDP, length 72
>> 
>> ** container
>> ~# tcpdump -i eth0 ip6
>> tcpdump: verbose output suppressed, use -v or -vv for full protocol 
>> decode listening on eth0, link-type EN10MB (Ethernet), capture size 
>> 262144 bytes
>> 11:17:29.002199 IP6 2607:f2f8:a8e0::2.35835 > 
>> 2001:41d0:1007:1c79::102.http: Flags [S], seq 2186876053, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243776920 ecr 0], length 
>> 0
>> 11:17:31.021757 IP6 2607:f2f8:a8e0::2.35836 > 
>> 2001:41d0:1007:1c79::102.http: Flags [S], seq 27613106, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243778940 ecr 0], length 
>> 0
>> 11:17:33.430934 IP6 2607:f2f8:a8e0::2.35838 > 
>> 2001:41d0:1007:1c79::102.https: Flags [S], seq 4010892160, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243781350 ecr 0], length 
>> 0
>> 11:17:36.029967 IP6 2607:f2f8:a8e0::2.35840 > 
>> 2001:41d0:1007:1c79::102.https: Flags [S], seq 1369235300, win 65535, 
>> options [mss 1440,nop,wscale 6,sackOK,TS val 3243783940 ecr 0], length 
>> 0



More information about the pve-user mailing list