Bitte nur wie angegeben /128 verwenden.
Dann wäre es nett, wenn OVH die Server auch entsprechend ausliefern würde. Ich habe das jetzt angepasst, am beschriebenen Problem hat sich dadurch aber erst mal nichts geändert.
Ausgabe von "tcpdump -v -s0 -i eth0 ip6" auf dem pingenden System:
Code:
22:32:02.764174 IP6 (class 0xe0, hlim 255, next-header UDP (17) payload length: 80) fe80::12bd:18ff:fee5:ff80.2029 > ff02::66.2029: [udp sum ok] UDP, length 72
22:32:05.021110 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 64) 2001:41d0:a:169e::1 > 2001:41d0:a:16d0::1: [icmp6 sum ok] ICMP6, echo request, seq 1
22:32:05.116350 IP6 (class 0xe0, hlim 255, next-header UDP (17) payload length: 14) fe80::1ee6:c7ff:fe52:740.2029 > ff02::66.2029: [udp sum ok] UDP, length 6
22:32:06.021016 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 64) 2001:41d0:a:169e::1 > 2001:41d0:a:16d0::1: [icmp6 sum ok] ICMP6, echo request, seq 2
22:32:07.020975 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 64) 2001:41d0:a:169e::1 > 2001:41d0:a:16d0::1: [icmp6 sum ok] ICMP6, echo request, seq 3
22:32:08.020962 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 64) 2001:41d0:a:169e::1 > 2001:41d0:a:16d0::1: [icmp6 sum ok] ICMP6, echo request, seq 4
22:32:09.020957 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 64) 2001:41d0:a:169e::1 > 2001:41d0:a:16d0::1: [icmp6 sum ok] ICMP6, echo request, seq 5
22:32:10.020961 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 64) 2001:41d0:a:169e::1 > 2001:41d0:a:16d0::1: [icmp6 sum ok] ICMP6, echo request, seq 6
22:32:10.030948 IP6 (hlim 255, next-header ICMPv6 (58) payload length: 32) fe80::222:4dff:fe7c:be95 > 2001:41d0:a:16ff:ff:ff:ff:ff: [icmp6 sum ok] ICMP6, neighbor solicitation, length 32, who has 2001:41d0:a:16ff:ff:ff:ff:ff
source link-address option (1), length 8 (1): 00:22:4d:7c:be:95
22:32:10.031921 IP6 (class 0xe0, hlim 255, next-header ICMPv6 (58) payload length: 24) 2001:41d0:a:16ff:ff:ff:ff:ff > fe80::222:4dff:fe7c:be95: [icmp6 sum ok] ICMP6, neighbor advertisement, length 24, tgt is 2001:41d0:a:16ff:ff:ff:ff:ff, Flags [router, solicited]
22:32:11.020975 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 64) 2001:41d0:a:169e::1 > 2001:41d0:a:16d0::1: [icmp6 sum ok] ICMP6, echo request, seq 7
22:32:11.804408 IP6 (class 0xe0, hlim 255, next-header UDP (17) payload length: 80) fe80::1ee6:c7ff:fe52:740.2029 > ff02::66.2029: [udp sum ok] UDP, length 72
22:32:12.020960 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 64) 2001:41d0:a:169e::1 > 2001:41d0:a:16d0::1: [icmp6 sum ok] ICMP6, echo request, seq 8
22:32:13.020960 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 64) 2001:41d0:a:169e::1 > 2001:41d0:a:16d0::1: [icmp6 sum ok] ICMP6, echo request, seq 9
22:32:14.020955 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 64) 2001:41d0:a:169e::1 > 2001:41d0:a:16d0::1: [icmp6 sum ok] ICMP6, echo request, seq 10
...und auf dem Zielsystem:
Code:
22:31:57.120244 IP6 (class 0xe0, hlim 255, next-header UDP (17) payload length: 80) fe80::1ee6:c7ff:fe52:740.2029 > ff02::66.2029: [udp sum ok] UDP, length 72
22:32:02.763684 IP6 (class 0xe0, hlim 255, next-header UDP (17) payload length: 80) fe80::12bd:18ff:fee5:ff80.2029 > ff02::66.2029: [udp sum ok] UDP, length 72
22:32:05.116024 IP6 (class 0xe0, hlim 255, next-header UDP (17) payload length: 14) fe80::1ee6:c7ff:fe52:740.2029 > ff02::66.2029: [udp sum ok] UDP, length 6
22:32:11.804097 IP6 (class 0xe0, hlim 255, next-header UDP (17) payload length: 80) fe80::1ee6:c7ff:fe52:740.2029 > ff02::66.2029: [udp sum ok] UDP, length 72
22:32:17.799801 IP6 (class 0xe0, hlim 255, next-header UDP (17) payload length: 80) fe80::12bd:18ff:fee5:ff80.2029 > ff02::66.2029: [udp sum ok] UDP, length 72
Gesamtresultat:
Code:
--- 2001:41d0:a:16d0::1 ping statistics ---
10 packets transmitted, 0 received, 100% packet loss
Firewallregeln waren zum Testzeitpunkt keine aktiv.
Ich habe noch einen "alten" KS2G mit identischer Installation in RBX, und IPv6-Verbindungen von und nach dort mit o.g. Servern funktionieren problemlos.