Hello,

@Fernando Gont:

I have tried that as well. No difference.


@ Bastien Durel

When pinging ff02::2%vio0 I don't receive any replies.

The tcpdump for those requests is the following:

<host># tcpdump -ni vio0 icmp6      
tcpdump: listening on vio0, link-type EN10MB
15:47:40.580787 fe80::22d8:b00:86fa:424c > ff02::1:ff00:0: icmp6: neighbor sol: 
who has 2a03:4000:21:6db:: [class 0xc0]
15:47:40.583638 fe80::22d8:b00:86fa:424c > ff02::1:ff96:189a: icmp6: neighbor 
sol: who has 2a03:4000:21:18a:84e:27ff:fe96:189a [class 0xc0]
15:47:41.725300 fe80::22d8:b00:86ee:ff4 > ff02::1:ff96:189a: icmp6: neighbor 
sol: who has 2a03:4000:21:18a:84e:27ff:fe96:189a [class 0xc0]
15:47:43.844162 fe80::2de:361a:24aa:d7a6 > ff02::2: icmp6: echo request
15:47:44.845036 fe80::2de:361a:24aa:d7a6 > ff02::2: icmp6: echo request
15:47:45.581326 fe80::22d8:b00:86fa:424c > ff02::1:ff96:189a: icmp6: neighbor 
sol: who has 2a03:4000:21:18a:84e:27ff:fe96:189a [class 0xc0]
15:47:45.834984 fe80::2de:361a:24aa:d7a6 > ff02::2: icmp6: echo request
15:47:46.729443 fe80::22d8:b00:86ee:ff4 > ff02::1:ff96:189a: icmp6: neighbor 
sol: who has 2a03:4000:21:18a:84e:27ff:fe96:189a [class 0xc0]
15:47:46.835383 fe80::2de:361a:24aa:d7a6 > ff02::2: icmp6: echo request
15:47:47.580262 fe80::22d8:b00:86fa:424c > ff02::1:ff00:3: icmp6: neighbor sol: 
who has 2a03:4000:21:6ef::3 [class 0xc0]
15:47:47.835361 fe80::2de:361a:24aa:d7a6 > ff02::2: icmp6: echo request
15:47:48.581182 fe80::22d8:b00:86fa:424c > ff02::1:ff00:3: icmp6: neighbor sol: 
who has 2a03:4000:21:6ef::3 [class 0xc0]
15:47:48.581516 fe80::8d4:7cff:fe04:a773 > ff02::1:ff00:0: icmp6: neighbor sol: 
who has ::
15:47:48.582270 fe80::845e:61ff:fe17:997d > ff02::1:ff00:0: icmp6: neighbor 
sol: who has ::
15:47:48.584608 fe80::3800:edff:fe06:769c > ff02::1:ff00:0: icmp6: neighbor 
sol: who has ::
15:47:48.590014 fe80::b438:86ff:fe34:b14d > ff02::1:ff00:0: icmp6: neighbor 
sol: who has ::
15:47:48.835487 fe80::2de:361a:24aa:d7a6 > ff02::2: icmp6: echo request
15:47:49.580501 fe80::22d8:b00:86fa:424c > ff02::1:ff00:3: icmp6: neighbor sol: 
who has 2a03:4000:21:6ef::3 [class 0xc0]
15:47:49.835293 fe80::2de:361a:24aa:d7a6 > ff02::2: icmp6: echo request
15:47:50.589407 fe80::22d8:b00:86fa:424c > ff02::1:ff96:189a: icmp6: neighbor 
sol: who has 2a03:4000:21:18a:84e:27ff:fe96:189a [class 0xc0]
15:47:51.725823 fe80::22d8:b00:86ee:ff4 > ff02::1:ff96:189a: icmp6: neighbor 
sol: who has 2a03:4000:21:18a:84e:27ff:fe96:189a [class 0xc0]

fe80::2de:361a:24aa:d7a6
 --> address of my interface.

Regards, 
Stephan.

On 8/23/19 1:13 PM, Bastien Durel wrote:
> Le jeudi 22 août 2019 à 20:11 +0200, list a écrit :
>> Hi,
>>
>> I might be missing something right here....
>>
>> I have the output of "route show" attached, because I cannot paste it
>> in
>> here in a formatted form.
>>
>>
>> This is super annoying.
>>
>> Just wanna get the damn thing running.
>>
> ff02::2 is a multicast address, it's not intended to be used as a route
> gateway.
> It's only a way to discover routers.
>
> for example:
>
> fremen# ping6  ff02::2%em1
> PING ff02::2%em1 (ff02::2%em1): 56 data bytes
> 64 bytes from fe80::6366:1356:e19:f361%em1: icmp_seq=0 hlim=64 time=0.114 ms
> 64 bytes from fe80::225:22ff:fe1e:bb7%em1: icmp_seq=0 hlim=64 time=0.320 ms 
> (DUP!)
> 64 bytes from fe80::6366:1356:e19:f361%em1: icmp_seq=1 hlim=64 time=0.082 ms
> 64 bytes from fe80::225:22ff:fe1e:bb7%em1: icmp_seq=1 hlim=64 time=0.293 ms 
> (DUP!)
>
> Here fe80::6366:1356:e19:f361 is the LL address of em1, so
> fe80::225:22ff:fe1e:bb7%em1 is the router on the other side of link.
>

Reply via email to