Hi list,
Doing tcpdump(8) on a wireguard tunnel yields:
--------------------------------------------------------------------------------
# tcpdump -n -i tun0 icmp6
tcpdump: listening on tun0, link-type LOOP
18:44:34.742106 2001:470:7653:5::11 > 2001:638:60f:110::1:2: icmp6: echo
request [flowlabel 0xb6f77]
18:44:34.754246 bad-ip-version 6
18:44:35.802498 2001:470:7653:5::11 > 2001:638:60f:110::1:2: icmp6: echo
request [flowlabel 0xb6f77]
18:44:35.814841 bad-ip-version 6
18:44:36.860380 2001:470:7653:5::11 > 2001:638:60f:110::1:2: icmp6: echo
request [flowlabel 0xb6f77]
18:44:36.872536 bad-ip-version 6
18:44:37.917605 2001:470:7653:5::11 > 2001:638:60f:110::1:2: icmp6: echo
request [flowlabel 0xb6f77]
18:44:37.929694 bad-ip-version 6
—————————————————————————————————————————
Huh? I thought that 6 is the current version? ;-)
Also, the echo replies are not shown, although I know they exist. Is there a
known problem with tcpdump(8) on wireguard tunnels?
# uname -a
OpenBSD wg.rebehn.net 6.5 GENERIC#2 amd64
dmesg|grep GENERIC
OpenBSD 6.5-current (GENERIC) #2: Sun Jun 2 00:21:42 MDT 2019
[email protected]:/usr/src/sys/arch/amd64/compile/GENERIC
Running under VMware ESXI 6.7
Manpage and mailing list did not give any hints.
Cheers,
Heinrich