What does `sysctl net.inet6.ip6.forwarding` say ?  It should be set to
1...

Cheers,

Paul 'WEiRD' de Weerd

On Tue, Jan 04, 2011 at 03:28:15PM +0100, nothingness wrote:
| Hi all,
| 
|   I've been trying for a few days to get my ipv6 tunnel to work from my
| lan. I've got a sixxs.net tunnel with a /48 assigned for my lan. I can
| connect from the router to irc networks over ipv6 but I'm unable to run
| traffic out via the gif0 for anything originating from the lan. I can
| also connect to the router over ipv6 for ssh stuff for ex. I'm
| completely out of ideas on what to do to get this to work, hope someone
| will have a suggestion. Here's my pf.conf (I'm running  openbsd 4.8 with
| a generic kernel, patched to latest release):
| 
| ext_if="bge0"
| 
| ipv6_if="gif0"
| ipv6_ip="2001:1620:f00:56::2"
| ipv6_gw="2001:1620:f00:56::1"
| ipv6_lan="2001:1620:f2e1::/64"
| ipv6_lan2="2001:1620:f2e3::/64"
| 
| int_if="dc0"
| vpn1_if="tun1"
| vpn2_if="tun2"
| vpn3_if="tun3"
| tcp_services="{ 179, 2027:2037, 5002, 7777, 8296, 46411 }"
| udp_services="{ 1194, 5003, 5501, 7777, 30000, 46411 }"
| icmp_types="echoreq"
| ssh_ports="{ ssh , 1194 }"
| im_ports="{ icq, msn, ircd, ircd-ssl }"
| 
| table <ssh-violations> persist file "/etc/ssh-violations"
| table <spamd-white> persist
| set block-policy drop
| set loginterface $ipv6_if
| set skip on lo
| set state-policy if-bound
| 
| match out on $ext_if inet from !($ext_if) nat-to ($ext_if)
| 
| match in on $int_if proto tcp to ($int_if) port ftp rdr-to 127.0.0.1
| port 8021
| match in on $int_if proto tcp to ($int_if) port http rdr-to 127.0.0.1
| port 3128
| match in on $ext_if proto tcp to ($ext_if) port smtp rdr-to 127.0.0.1
| port spamd
| block in log
| pass out keep state
| 
| block drop in log on $ext_if from <ssh-violations> to any
| block drop in log on $ipv6_if from <ssh-violations> to any
| 
| #try ipv6 routing
| pass quick on $ipv6_if proto {ipencap, ipv6}
| pass quick on $ext_if proto {ipencap, ipv6}
| pass quick on $ext_if inet6
| pass quick on $ipv6_if inet6
| 
| pass in on $ext_if proto udp from any to any port 1194
| pass in inet proto icmp all icmp-type $icmp_types keep state
| pass proto 41 from any to any keep state
| pass quick on $int_if no state
| pass quick on $vpn1_if no state
| pass quick on $vpn2_if no state
| pass quick on $vpn3_if no state
| 
| #pass quick on $vpn_if inet proto gre any
| pass quick from 224/7 to any keep state
| 
| 
| Cheers,
| 
| Noth
| 

-- 
>++++++++[<++++++++++>-]<+++++++.>+++[<------>-]<.>+++[<+
+++++++++++>-]<.>++[<------------>-]<+.--------------.[-]
                 http://www.weirdnet.nl/                 

Reply via email to