Hi Daniel,
of course we can steadily move on, no problem. So now we move to VLAN level?

BR
Peter

-----Original Message-----
From: Daniel Gröber <d...@darkboxed.org> 
Sent: sobota 18. novembra 2023 3:43
To: GASPAROVIC Peter OBS/MKT <peter.gasparo...@orange.com>
Cc: 1054...@bugs.debian.org
Subject: Re: Bug#1054642: Failing ARP relay from external -> Linux bridge -> 
veth port --> NS veth port

Hi Peter,

On Mon, Nov 13, 2023 at 09:40:46AM +0000, peter.gasparo...@orange.com wrote:
> In the meantime, I was stubborn to find a solution to what I need in 
> order to progress and MACVLAN tech actually delivered it (private mode 
> enough),

I used to love macvlan too but now I do L3 instead ;P

> something newer than VETH tech what I could read about, and it's just 
> perfect avoiding bridge itself. So no problem to cooperate on this 
> fix, I will be glad, just it can get lower priority on your side if 
> you even attributed it some 😊

I'd be happy to still track this bug down but I need you to investigate the 
behaviour in your environment. If you've torn down the lab already we can also 
just call it quits.

If you do want to continue some questions are still pending, see quoted below.

> On Mon, Oct 30, 2023 at 07:25:38PM +0000, peter.gasparo...@orange.com wrote:
> > 1) As was reported, foreign external world MAC@ does not pass into 
> > network namespace, just external border point "vlan199"
> 
> How did you check this?
>
> > 2) now collecting data for you, honestly I don’t see external mac 
> > address on "inet-br" object, so my previous statement was incorrect..
> > {ossibly I might mixed this up with another "labinet-br" (working in 
> > its limited
> > scope) which is IP-defined, while "inet-br" in question is not.
> >
> > 3) so question is, if the MACs learnt via vlan199 are supposed to be 
> > paired (displayed) with "inet-br" object and all way up into NS....
> 
> I want to make sure we're on the same page, how do you check if the MAC is 
> reaching into the NS? I assume using `ip neigh`? I'd have a look at tcpdump 
> this will tell you whether ARP is even reaching the NS or not.
> 
> Something simple like
> 
>     $ tcpdump -enli $IFACE 'arp or icmp'
> 
> optionally you can filter by MAC (`ether host` in pcap-filter speak):
> 
>     $ tcpdump -enli $IFACE ('arp or icmp) and ether host 
> aa:00:00:00:00:01
> 
> Oh and one last thing: please double and tripple check that a firewall isn't 
> interfering.

--Daniel
____________________________________________________________________________________________________________
Ce message et ses pieces jointes peuvent contenir des informations 
confidentielles ou privilegiees et ne doivent donc
pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce 
message par erreur, veuillez le signaler
a l'expediteur et le detruire ainsi que les pieces jointes. Les messages 
electroniques etant susceptibles d'alteration,
Orange decline toute responsabilite si ce message a ete altere, deforme ou 
falsifie. Merci.

This message and its attachments may contain confidential or privileged 
information that may be protected by law;
they should not be distributed, used or copied without authorisation.
If you have received this email in error, please notify the sender and delete 
this message and its attachments.
As emails may be altered, Orange is not liable for messages that have been 
modified, changed or falsified.
Thank you.

Reply via email to