El 30/1/26 a las 23:47, Ramiro Aceves escribió:

Hello Greg

With the following routes I can ping fine from the mobile phone, please see 
below. But when I try to start a SSH session, it never success.


netbsd-raspaZeroW# route -n show
Routing tables

Internet:
Destination        Gateway            Flags    Refs      Use    Mtu Interface
default            44.27.132.76       UGS         -        -      -  wg0
44.27.132.76       wg0                UHl         -        -      -  wg0
44.27.132.76/32    44.27.132.76       U           -        -      -  wg0
44.27.227.1        192.168.1.1        UGHS        -        -      -  bwfm0
127/8              127.0.0.1          UGRS        -        -  33176  lo0
127.0.0.1          lo0                UHl         -        -  33176  lo0
192.168.1/24       link#2             UC          -        -      -  bwfm0
192.168.1.230      link#2             UHl         -        -      -  lo0
192.168.1.203      d8:3a:dd:99:78:45  UHL         -        -      -  bwfm0
192.168.1.1        60:8d:26:32:34:23  UHL         -        -      -  bwfm0
192.168.1.51       20:28:bc:eb:8d:ae  UHL         -        -      -  bwfm0



23:19:10.181755 IP 90.167.219.193 > 44.27.132.76: ICMP echo request, id 25199, 
seq 1, length 64
23:19:10.181941 IP 44.27.132.76 > 90.167.219.193: ICMP echo reply, id 25199, 
seq 1, length 64


23:19:13.699283 IP 90.167.219.193.25196 > 44.27.132.76.22: Flags [S], seq 
3379571502, win 65535, options [mss 1410,sackOK,TS val 845496656 ecr 0,nop,wscale 
10], length 0
23:19:13.699422 IP 44.27.132.76.22 > 90.167.219.193.25196: Flags [S.], seq 
1838093467, ack 3379571503, win 32768, options [mss 1460,nop,wscale 3,sackOK,TS 
val 1 ecr 845496656], length 0
23:19:13.869650 IP 90.167.219.193.25196 > 44.27.132.76.22: Flags [.], ack 1, 
win 86, options [nop,nop,TS val 845496833 ecr 1], length 0
23:19:13.870218 IP 90.167.219.193.25196 > 44.27.132.76.22: Flags [P.], seq 
1:23, ack 1, win 86, options [nop,nop,TS val 845496837 ecr 1], length 22
23:19:14.062777 IP 44.27.132.76.22 > 90.167.219.193.25196: Flags [.], ack 23, 
win 4194, options [nop,nop,TS val 2 ecr 845496837], length 0
23:19:14.142755 IP 44.27.132.76.22 > 90.167.219.193.25196: Flags [P.], seq 
1:64, ack 23, win 4194, options [nop,nop,TS val 2 ecr 845496837], length 63
23:19:14.309616 IP 90.167.219.193.25196 > 44.27.132.76.22: Flags [.], ack 64, 
win 86, options [nop,nop,TS val 845497277 ecr 2], length 0
23:19:14.309778 IP 44.27.132.76.22 > 90.167.219.193.25196: Flags [P.], seq 
64:1184, ack 23, win 4197, options [nop,nop,TS val 2 ecr 845497277], length 1120
23:19:14.317253 IP 90.167.219.193.25196 > 44.27.132.76.22: Flags [P.], seq 
1421:1591, ack 64, win 86, options [nop,nop,TS val 845497281 ecr 2], length 170
23:19:14.317375 IP 44.27.132.76.22 > 90.167.219.193.25196: Flags [.], ack 23, 
win 4197, options [nop,nop,TS val 2 ecr 845497277,nop,nop,sack 1 {1421:1591}], 
length 0
23:19:14.522748 IP 90.167.219.193.25196 > 44.27.132.76.22: Flags [.], ack 1184, 
win 89, options [nop,nop,TS val 845497496 ecr 2], length 0
^C
32 packets captured
32 packets received by filter
0 packets dropped by kernel
netbsd-raspaZeroW#


ssh server on the RPi negociates but it never ends. AI suggests that UDP 
packets inside the tunnel are corrupted because (perhaps) a flaky bwfm driver, 
but how knows, many times it says wrong things...

(Also the interface needs to be "resurrected" as before, but it is another 
story)

We are far better than before but I does not work yet.

Regards.
Ramiro.


Hi,

I have repeated the test with the new tables in my AMD64 Intel Nuc connected 
via ethernet and the result is the same. Sent three test pings followed by 
starting an SSH connection that never success:



netbsd-nuc# tcpdump -n -i wg0 host 44.27.132.76
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wg0, link-type NULL (BSD loopback), capture size 262144 bytes
07:13:30.410683 IP 90.167.219.193 > 44.27.132.76: ICMP echo request, id 44133, 
seq 1, length 64
07:13:30.410699 IP 44.27.132.76 > 90.167.219.193: ICMP echo reply, id 44133, 
seq 1, length 64
07:13:31.429842 IP 90.167.219.193 > 44.27.132.76: ICMP echo request, id 44133, 
seq 2, length 64
07:13:31.429860 IP 44.27.132.76 > 90.167.219.193: ICMP echo reply, id 44133, 
seq 2, length 64
07:13:32.429833 IP 90.167.219.193 > 44.27.132.76: ICMP echo request, id 44133, 
seq 3, length 64
07:13:32.429851 IP 44.27.132.76 > 90.167.219.193: ICMP echo reply, id 44133, 
seq 3, length 64
07:13:37.531243 IP 90.167.219.193.44127 > 44.27.132.76.22: Flags [S], seq 
145184924, win 65535, options [mss 1410,sackOK,TS val 851808448 ecr 0,nop,wscale 
10], length 0
07:13:37.531257 IP 44.27.132.76.22 > 90.167.219.193.44127: Flags [S.], seq 
1482509222, ack 145184925, win 32768, options [mss 1460,nop,wscale 3,sackOK,TS val 
1 ecr 851808448], length 0
07:13:37.701029 IP 90.167.219.193.44127 > 44.27.132.76.22: Flags [.], ack 1, 
win 86, options [nop,nop,TS val 851808627 ecr 1], length 0
07:13:37.708854 IP 90.167.219.193.44127 > 44.27.132.76.22: Flags [P.], seq 
1:23, ack 1, win 86, options [nop,nop,TS val 851808631 ecr 1], length 22
07:13:37.745163 IP 44.27.132.76.22 > 90.167.219.193.44127: Flags [P.], seq 
1:64, ack 23, win 4194, options [nop,nop,TS val 1 ecr 851808631], length 63
07:13:37.920768 IP 90.167.219.193.44127 > 44.27.132.76.22: Flags [.], ack 64, 
win 86, options [nop,nop,TS val 851808841 ecr 1], length 0
07:13:37.920794 IP 44.27.132.76.22 > 90.167.219.193.44127: Flags [P.], seq 
64:1184, ack 23, win 4197, options [nop,nop,TS val 2 ecr 851808841], length 1120
07:13:37.929014 IP 90.167.219.193.44127 > 44.27.132.76.22: Flags [P.], seq 
1421:1591, ack 64, win 86, options [nop,nop,TS val 851808847 ecr 1], length 170
07:13:37.929029 IP 44.27.132.76.22 > 90.167.219.193.44127: Flags [.], ack 23, 
win 4197, options [nop,nop,TS val 2 ecr 851808841,nop,nop,sack 1 {1421:1591}], 
length 0
07:13:38.139063 IP 90.167.219.193.44127 > 44.27.132.76.22: Flags [.], ack 1184, 
win 89, options [nop,nop,TS val 851809069 ecr 2], length 0
07:13:39.080829 IP 20.102.117.55.51803 > 44.27.132.76.143: Flags [S], seq 
2992133723, win 65535, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
07:13:39.080840 IP 44.27.132.76.143 > 20.102.117.55.51803: Flags [R.], seq 0, 
ack 2992133724, win 0, length 0
^C
18 packets captured
19 packets received by filter
0 packets dropped by kernel
netbsd-nuc#

Regards

Reply via email to