5
« Dernier message par vivien le Aujourd'hui à 10:19:48 »
Le problème IPv6 est toujours présent avec la Flybox 5G.
Je remarque qu'il n’apparaît pas au démarrage de la box, mais plus tard. Quand j'allume la box IPv6 est ok, le lendemain, je n'ai plus que IPv4.
Cette fois-ci, même sur Android je n'ai plus d'IPv6.
Sur mon PC :
$ ip -6 -c addr show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 state UNKNOWN qlen 1000
inet6 ::1/128 scope host noprefixroute
valid_lft forever preferred_lft forever
3: wlp2s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2a01:cb09:804b:abb8::fd4/128 scope global dynamic noprefixroute
valid_lft 83861sec preferred_lft 40661sec
inet6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352/64 scope global temporary dynamic
valid_lft 85976sec preferred_lft 42776sec
inet6 2a01:cb09:804b:abb8:7546:7ebf:fdba:50f3/64 scope global dynamic mngtmpaddr noprefixroute
valid_lft 85976sec preferred_lft 42776sec
inet6 fe80::9c99:ca8b:b01c:b524/64 scope link noprefixroute
valid_lft forever preferred_lft forever
$ ip -6 route show
2a01:cb09:804b:abb8::fd4 dev wlp2s0 proto kernel metric 600 pref medium
2a01:cb09:804b:abb8::/64 dev wlp2s0 proto ra metric 600 pref medium
fe80::/64 dev wlp2s0 proto kernel metric 1024 pref medium
default via fe80::aafb:40ff:fed2:3c4f dev wlp2s0 proto ra metric 20600 pref medium
$ ping lafibre.info
PING lafibre.info (2a0b:cbc0:10:1af1:b2e::1f0) 56 data bytes
^C
--- lafibre.info ping statistics ---
19 packets transmitted, 0 received, 100% packet loss, time 18430ms
$ sudo tcpdump -pns0 -i wlp2s0 icmp6
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on wlp2s0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
10:05:22.085811 IP6 fe80::aafb:40ff:fed2:3c4f > ff02::1: ICMP6, router advertisement, length 96
10:05:43.257654 IP6 fe80::9c99:ca8b:b01c:b524 > fe80::aafb:40ff:fed2:3c4f: ICMP6, neighbor solicitation, who has fe80::aafb:40ff:fed2:3c4f, length 32
10:05:43.264379 IP6 fe80::aafb:40ff:fed2:3c4f > fe80::9c99:ca8b:b01c:b524: ICMP6, neighbor advertisement, tgt is fe80::aafb:40ff:fed2:3c4f, length 24
10:05:48.300648 IP6 fe80::aafb:40ff:fed2:3c4f > fe80::9c99:ca8b:b01c:b524: ICMP6, neighbor solicitation, who has fe80::9c99:ca8b:b01c:b524, length 32
10:05:48.300706 IP6 fe80::9c99:ca8b:b01c:b524 > fe80::aafb:40ff:fed2:3c4f: ICMP6, neighbor advertisement, tgt is fe80::9c99:ca8b:b01c:b524, length 24
10:05:49.211855 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 1, length 64
10:05:50.233795 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 2, length 64
10:05:51.257783 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 3, length 64
10:05:52.281770 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 4, length 64
10:05:53.305780 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 5, length 64
10:05:54.330690 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 6, length 64
10:05:55.353799 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 7, length 64
10:05:56.377766 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 8, length 64
10:05:57.401771 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 9, length 64
10:05:58.425827 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 10, length 64
10:05:59.450754 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 11, length 64
10:06:00.473705 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 12, length 64
10:06:01.497787 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 13, length 64
10:06:02.521796 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 14, length 64
10:06:03.545752 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 15, length 64
10:06:04.569764 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 16, length 64
10:06:05.593960 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 17, length 64
10:06:06.617792 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 18, length 64
10:06:07.641779 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, id 3, seq 19, length 64
^C
24 packets captured
69 packets received by filter
0 packets dropped by kernel
Capture fait simultanément coté serveur : On voit bien les paquets arriver et repartir.
$ sudo tcpdump -pns0 -i bond0 icmp6 | grep 2a01:cb09:804b:abb8
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on bond0, link-type EN10MB (Ethernet), capture size 262144 bytes
10:05:49.217876 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 1, length 64
10:05:49.217901 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 1, length 64
10:05:50.237876 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 2, length 64
10:05:50.237902 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 2, length 64
10:05:51.257790 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 3, length 64
10:05:51.257831 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 3, length 64
10:05:52.277670 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 4, length 64
10:05:52.277696 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 4, length 64
10:05:53.318308 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 5, length 64
10:05:53.318352 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 5, length 64
10:05:54.337921 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 6, length 64
10:05:54.337953 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 6, length 64
10:05:55.358222 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 7, length 64
10:05:55.358262 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 7, length 64
10:05:56.377619 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 8, length 64
10:05:56.377649 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 8, length 64
10:05:57.397787 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 9, length 64
10:05:57.397812 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 9, length 64
10:05:58.438661 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 10, length 64
10:05:58.438693 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 10, length 64
10:05:59.457794 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 11, length 64
10:05:59.457815 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 11, length 64
10:06:00.483329 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 12, length 64
10:06:00.483350 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 12, length 64
10:06:01.497803 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 13, length 64
10:06:01.497833 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 13, length 64
10:06:02.519319 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 14, length 64
10:06:02.519355 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 14, length 64
10:06:03.558186 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 15, length 64
10:06:03.558228 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 15, length 64
10:06:04.578015 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 16, length 64
10:06:04.578040 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 16, length 64
10:06:05.597830 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 17, length 64
10:06:05.597866 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 17, length 64
10:06:06.618004 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 18, length 64
10:06:06.618045 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 18, length 64
10:06:07.657685 IP6 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352 > 2a0b:cbc0:10:1af1:b2e::1f0: ICMP6, echo request, seq 19, length 64
10:06:07.657730 IP6 2a0b:cbc0:10:1af1:b2e::1f0 > 2a01:cb09:804b:abb8:f09d:660e:d9ff:9352: ICMP6, echo reply, seq 19, length 64
^C
1801 packets captured
1818 packets received by filter
0 packets dropped by kernel