Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Charter 6RD connection not working in latest snaps

    Scheduled Pinned Locked Moved 2.1 Snapshot Feedback and Problems - RETIRED
    39 Posts 10 Posters 12.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      SebastianLee
      last edited by

      After the Tue Mar 19 16:39:04 EDT 2013 build, I did have to go to the Interfaces menu for both the Wan and Lan and hit save and apply for the Ipv6 portion to update.  No changes were made to either interfaces.

      ifcongfig output:

      re0: flags=8843 <up,broadcast,running,simplex,multicast>metric 0 mtu 1500
              options=209b <rxcsum,txcsum,vlan_mtu,vlan_hwtagging,vlan_hwcsum,wol_magic>ether 00:1c:c0:7f:64:57
              inet6 fe80::21c:c0ff:fe7f:6457%re0 prefixlen 64 scopeid 0x1
              inet 192.168.1.1 netmask 0xffffff00 broadcast 192.168.1.255
              inet6 fe80::1:1%re0 prefixlen 64 scopeid 0x1
              inet6 2602:100:44b8:yyyy::1 prefixlen 64
              nd6 options=1 <performnud>media: Ethernet autoselect (1000baseT <full-duplex>)
              status: active
      em0: flags=8843 <up,broadcast,running,simplex,multicast>metric 0 mtu 1500
              options=9b <rxcsum,txcsum,vlan_mtu,vlan_hwtagging,vlan_hwcsum>ether 00:07:e9:1f:a9:48
              inet6 fe80::207:e9ff:fe1f:a948%em0 prefixlen 64 scopeid 0x2
              inet 68.184.84.xxx netmask 0xfffffc00 broadcast 255.255.255.255
              nd6 options=1 <performnud>media: Ethernet autoselect (1000baseT <full-duplex>)
              status: active
      em1: flags=8802 <broadcast,simplex,multicast>metric 0 mtu 1500
              options=9b <rxcsum,txcsum,vlan_mtu,vlan_hwtagging,vlan_hwcsum>ether 00:07:e9:1f:a9:49
              media: Ethernet autoselect
              status: no carrier
      enc0: flags=0<> metric 0 mtu 1536
      pfsync0: flags=0<> metric 0 mtu 1460
              syncpeer: 224.0.0.240 maxupd: 128 syncok: 1
      lo0: flags=8049 <up,loopback,running,multicast>metric 0 mtu 16384
              options=3 <rxcsum,txcsum>inet 127.0.0.1 netmask 0xff000000
              inet6 ::1 prefixlen 128
              inet6 fe80::1%lo0 prefixlen 64 scopeid 0x6
              nd6 options=3 <performnud,accept_rtadv>pflog0: flags=100 <promisc>metric 0 mtu 33664
      ue0: flags=8843 <up,broadcast,running,simplex,multicast>metric 0 mtu 1500
              options=80008 <vlan_mtu,linkstate>ether 00:50:b6:0d:38:9d
              inet6 fe80::250:b6ff:fe0d:389d%ue0 prefixlen 64 scopeid 0x8
              nd6 options=1 <performnud>media: Ethernet autoselect (100baseTX <full-duplex>)
              status: active
      ue1: flags=8843 <up,broadcast,running,simplex,multicast>metric 0 mtu 1500
              options=80000 <linkstate>ether 00:14:d1:1b:86:e1
              inet6 fe80::214:d1ff:fe1b:86e1%ue1 prefixlen 64 scopeid 0x9
              inet 192.168.10.1 netmask 0xfffffff0 broadcast 192.168.10.15
              nd6 options=1 <performnud>media: Ethernet autoselect (10baseT/UTP <half-duplex>)
              status: active
      wan_stf: flags=4001 <up,link2>metric 0 mtu 1280
              inet6 2602:100:44b8:yyyy:: prefixlen 32
              nd6 options=3<performnud,accept_rtadv></performnud,accept_rtadv></up,link2></half-duplex></performnud></linkstate></up,broadcast,running,simplex,multicast></full-duplex></performnud></vlan_mtu,linkstate></up,broadcast,running,simplex,multicast></promisc></performnud,accept_rtadv></rxcsum,txcsum></up,loopback,running,multicast></rxcsum,txcsum,vlan_mtu,vlan_hwtagging,vlan_hwcsum></broadcast,simplex,multicast></full-duplex></performnud></rxcsum,txcsum,vlan_mtu,vlan_hwtagging,vlan_hwcsum></up,broadcast,running,simplex,multicast></full-duplex></performnud></rxcsum,txcsum,vlan_mtu,vlan_hwtagging,vlan_hwcsum,wol_magic></up,broadcast,running,simplex,multicast>
      

      netstat -rn output:

       netstat -rn
      Routing tables
      
      Internet:
      Destination        Gateway            Flags    Refs      Use  Netif Expire
      default            68.184.84.1        UGS         0     1671    em0
      8.8.8.8            68.184.84.1        UGHS        0     2616    em0
      24.197.160.17      68.184.84.1        UGHS        0     2606    em0
      68.114.165.1       68.184.84.1        UGHS        0        0    em0
      68.184.84.0/22     link#2             U           0    39934    em0
      68.184.84.xxx      link#2             UHS         0        0    lo0
      127.0.0.1          link#6             UH          0      126    lo0
      192.168.1.0/24     link#1             U           0   275560    re0
      192.168.1.1        link#1             UHS         0        0    lo0
      192.168.10.0/28    link#9             U           0      817    ue1
      192.168.10.1       link#9             UHS         0        0    lo0
      205.171.2.65       68.184.84.1        UGHS        0     2606    em0
      
      Internet6:
      Destination                       Gateway                       Flags      Netif Expire
      default                           2602:100:4472:a501::          UGS     wan_stf
      ::1                               ::1                           UH          lo0
      2602:100::/32                     link#10                       U       wan_stf
      2602:100:44b8:yyyy::              link#10                       UHS         lo0 =>
      2602:100:44b8:yyyy::/64           link#1                        U           re0
      2602:100:44b8:yyyy::1             link#1                        UHS         lo0
      fe80::%re0/64                     link#1                        U           re0
      fe80::1:1%re0                     link#1                        UHS         lo0
      fe80::21c:c0ff:fe7f:6457%re0      link#1                        UHS         lo0
      fe80::%em0/64                     link#2                        U           em0
      fe80::207:e9ff:fe1f:a948%em0      link#2                        UHS         lo0
      fe80::%lo0/64                     link#6                        U           lo0
      fe80::1%lo0                       link#6                        UHS         lo0
      fe80::%ue0/64                     link#8                        U           ue0
      fe80::250:b6ff:fe0d:389d%ue0      link#8                        UHS         lo0
      fe80::%ue1/64                     link#9                        U           ue1
      fe80::214:d1ff:fe1b:86e1%ue1      link#9                        UHS         lo0
      ff01::%re0/32                     fe80::21c:c0ff:fe7f:6457%re0  U           re0
      ff01::%em0/32                     fe80::207:e9ff:fe1f:a948%em0  U           em0
      ff01::%lo0/32                     ::1                           U           lo0
      ff01::%ue0/32                     fe80::250:b6ff:fe0d:389d%ue0  U           ue0
      ff01::%ue1/32                     fe80::214:d1ff:fe1b:86e1%ue1  U           ue1
      ff02::%re0/32                     fe80::21c:c0ff:fe7f:6457%re0  U           re0
      ff02::%em0/32                     fe80::207:e9ff:fe1f:a948%em0  U           em0
      ff02::%lo0/32                     ::1                           U           lo0
      ff02::%ue0/32                     fe80::250:b6ff:fe0d:389d%ue0  U           ue0
      ff02::%ue1/32                     fe80::214:d1ff:fe1b:86e1%ue1  U           ue1
      

      tcpdumps:

      tcpdump -nnvvi re0 proto 41
      tcpdump: listening on re0, link-type EN10MB (Ethernet), capture size 96 bytes
      ^C
      0 packets captured
      2020 packets received by filter
      0 packets dropped by kernel
      
      tcpdump -nnvvi em0 proto 41
      tcpdump: listening on em0, link-type EN10MB (Ethernet), capture size 96 bytes
      ^C
      0 packets captured
      1802 packets received by filter
      0 packets dropped by kernel
      
      tcpdump -ni wan_stf
      tcpdump: WARNING: wan_stf: no IPv4 address assigned
      tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
      listening on wan_stf, link-type NULL (BSD loopback), capture size 96 bytes
      ^C
      0 packets captured
      0 packets received by filter
      0 packets dropped by kernel
      

      /tmp/rules.debug

      #System aliases
      
      loopback = "{ lo0 }"
      WAN = "{ em0 wan_stf }"
      LAN = "{ re0 }"
      WLAN = "{ ue1 }"
      PHONEDMZ = "{ ue0 }"
      
      # Gateways
      GWWAN_6RD = " route-to ( wan_stf 2602:100:4472:a501:: ) "
      GWWAN_DHCP = " route-to ( em0 68.184.84.1 ) "
      
      # IPv6 ICMP is not auxilary, it is required for operation
      # See man icmp6(4)
      # 1    unreach         Destination unreachable
      # 2    toobig          Packet too big
      # 128  echoreq         Echo service request
      # xxx  echorep         Echo service reply
      # 133  routersol       Router solicitation
      # 134  routeradv       Router advertisement
      # 135  neighbrsol      Neighbor solicitation
      # 136  neighbradv      Neighbor advertisement
      pass quick inet6 proto ipv6-icmp from any to any icmp6-type {1,2,135,136} keep state
      
      # Allow only bare essential icmpv6 packets (NS, NA, and RA, echoreq, echorep)
      pass out quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type {xxx,133,134,135,136} keep state
      pass out quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type {xxx,133,134,135,136} keep state
      pass in quick inet6 proto ipv6-icmp from fe80::/10 to fe80::/10 icmp6-type {128,133,134,135,136} keep state
      pass in quick inet6 proto ipv6-icmp from ff02::/16 to fe80::/10 icmp6-type {128,133,134,135,136} keep state
      pass in quick inet6 proto ipv6-icmp from fe80::/10 to ff02::/16 icmp6-type {128,133,134,135,136} keep state
      
      # We use the mighty pf, we cannot be fooled.
      block quick inet proto { tcp, udp } from any port = 0 to any
      block quick inet proto { tcp, udp } from any to any port = 0
      block quick inet6 proto { tcp, udp } from any port = 0 to any
      block quick inet6 proto { tcp, udp } from any to any port = 0
      
      # loopback
      pass in on $loopback inet all label "pass IPv4 loopback"
      pass out on $loopback inet all label "pass IPv4 loopback"
      pass in on $loopback inet6 all label "pass IPv6 loopback"
      pass out on $loopback inet6 all label "pass IPv6 loopback"
      # let out anything from the firewall host itself and decrypted IPsec traffic
      pass out inet all keep state allow-opts label "let out anything IPv4 from firewall host itself"
      pass out inet6 all keep state allow-opts label "let out anything IPv6 from firewall host itself"
      pass out route-to ( em0 68.184.84.1 ) from 68.184.84.xxx to !68.184.84.0/22 keep state allow-opts label "let out anything from firewall host itself"
      pass out route-to ( wan_stf 2602:100:4472:a501:: ) inet6 from 2602:100:44b8:yyyy:: to !2602:100:44b8:yyyy::/64 keep state allow-opts label "let out anything from firewall host itself"
      # make sure the user cannot lock himself out of the webConfigurator or SSH
      pass in quick on re0 proto tcp from any to (re0) port { 443 22 } keep state label "anti-lockout rule"
      
      

      radvd.conf :

      # Automatically Generated, do not edit
      # Generated for DHCPv6 Server lan
      interface re0 {
      	AdvSendAdvert on;
      	MinRtrAdvInterval 5;
      	MaxRtrAdvInterval 20;
      	AdvLinkMTU 1500;
      	AdvDefaultPreference medium;
      	prefix 2602:100:44b8:5481::/64 {
      		DeprecatePrefix on;
      	};
      	route ::/0 {
      		RemoveRoute on;
      	};
      	RDNSS 2602:100:44b8:5481::1 { };
      	DNSSL localdomain { };
      };
      
      

      dhcpdv6.conf :

      option domain-name "localdomain";
      option ldap-server code 95 = text;
      option domain-search-list code 119 = text;
      
      default-lease-time 7200;
      max-lease-time 86400;
      log-facility local7;
      ddns-update-style none;
      one-lease-per-client true;
      deny duplicates;
      ping-check true;
      authoritative;
      subnet6 2602:100:44b8:5481::/64 {
      	range6 2602:100:44b8:5481::1000 2602:100:44b8:5481::2000;
      	option dhcp6.name-servers 2602:100:44b8:5481::1;
      
      }
      
      
      1 Reply Last reply Reply Quote 0
      • E
        eri--
        last edited by

        What have you configured as your 6rd border ipv4 gateway?

        1 Reply Last reply Reply Quote 0
        • S
          SebastianLee
          last edited by

          Followed Charter's 6RD guide:

          6RD Configuration Settings
          As part of Charter's IPv6 Trials we have made available a Public 6rd Border Relay. If you are interested in participating in our early trials and own a device that supports 6RD use this configuration information to begin experiencing the Next Generation Internet:

          6rd Prefix = 2602💯:/32
              Border Relay Address = 68.114.165.1
              6rd prefix length = 32
              IPv4 mask length = 0

          Primary DNS Address = 2607:f428:1::5353:1

          Secondary DNS Address = 2607:f428:2::5353:1

          1 Reply Last reply Reply Quote 0
          • E
            eri--
            last edited by

            Can you try issuing these commands until it works:
            1- route add -inet6 default 2602💯44b8:yyyy::1
            Check if it works
            2 - ifconfig wan_stf inet6 2602💯44b8:yyyy:0::1/32
            Check if it works
            3 - route add -inet6 default  2602💯44b8:yyyy::68.114.165.1
            Check if it works

            1 Reply Last reply Reply Quote 0
            • S
              SebastianLee
              last edited by

              Didn't have much luck, none of those worked.

              route add -inet6 default 2602💯44b8:yyyy::1
              route: writing to routing socket: File exists
              add net default: gateway 2602💯44b8:yyyy::1: route already in table

              ping6 2607:f428:1::5353:1
              –- 2607:f428:1::5353:1 ping6 statistics ---
              12 packets transmitted, 0 packets received, 100.0% packet loss

              ping6 ipv6.google.com
              --- ipv6.l.google.com ping6 statistics ---
              12 packets transmitted, 0 packets received, 100.0% packet loss

              ifconfig wan_stf inet6 2602💯44b8:yyyy:0::1/32
              ifconfig: ioctl (SIOCAIFADDR): File exists

              ping6 2607:f428:1::5353:1
              –- 2607:f428:1::5353:1 ping6 statistics ---
              5 packets transmitted, 0 packets received, 100.0% packet loss

              ping6 ipv6.google.com
              --- ipv6.l.google.com ping6 statistics ---
              6 packets transmitted, 0 packets received, 100.0% packet loss

              route add -inet6 default  2602💯44b8:yyyy::68.114.165.1
              route: writing to routing socket: File exists
              add net default: gateway 2602💯44b8:yyyy::68.114.165.1: route already in table

              ping6 2607:f428:1::5353:1
              –- 2607:f428:1::5353:1 ping6 statistics ---
              6 packets transmitted, 0 packets received, 100.0% packet loss

              ping6 ipv6.google.com
              --- ipv6.l.google.com ping6 statistics ---
              10 packets transmitted, 0 packets received, 100.0% packet loss

              1 Reply Last reply Reply Quote 0
              • E
                eri--
                last edited by

                Ah you should delete the default gateway before trying route add :)

                or issue 'route change' instead of 'route add'

                1 Reply Last reply Reply Quote 0
                • S
                  SebastianLee
                  last edited by

                  Same result

                  route change -inet6 default 2602💯44b8:yyyy::1
                  change net default: gateway 2602💯44b8:yyyy::1

                  ping6 2607:f428:1::5353:1
                  6 packets transmitted, 0 packets received, 100.0% packet loss

                  ifconfig wan_stf inet6 2602💯44b8:yyyy:0::1/32
                  ifconfig: ioctl (SIOCAIFADDR): File exists

                  ping6 2607:f428:1::5353:1
                  3 packets transmitted, 0 packets received, 100.0% packet loss

                  route change -inet6 default  2602💯44b8:yyyy::68.114.165.1
                  change net default: gateway 2602💯44b8:yyyy::68.114.165.1

                  ping6 2607:f428:1::5353:1
                  7 packets transmitted, 0 packets received, 100.0% packet loss

                  1 Reply Last reply Reply Quote 0
                  • E
                    eri--
                    last edited by

                    Can you give me access to the system as well its easier that way.

                    1 Reply Last reply Reply Quote 0
                    • C
                      cmb
                      last edited by

                      I'm pretty sure the 6rd patch change on January 25 broke these. I just reverted those.

                      edit: change backed out, don't upgrade to Saturday's snapshot if using 6rd.

                      1 Reply Last reply Reply Quote 0
                      • C
                        cmb
                        last edited by

                        Don't upgrade if using 6rd at all for the moment. That change resulted in a kernel panic reboot loop when connecting to 6rd on Saturday's snapshot. I reverted things back to where they were a couple days ago. Sunday's snapshot should be fine, but probably want to wait to hear back from someone here.

                        1 Reply Last reply Reply Quote 0
                        • W
                          weekleyj
                          last edited by

                          No Panic with the latest, but no IPv6.  I've run the tests prescribed earlier (manually setting routes) with no effect.

                          1 Reply Last reply Reply Quote 0
                          • S
                            survive
                            last edited by

                            Hi guys,

                            Just tried the April 4th snapshot and it looks like 6RD is still broken.

                            Is there anything I can do to help you get the information you need to resolve this? Log files, remote access? Just let me know what you need and I would be happy to provide it.

                            -Will

                            1 Reply Last reply Reply Quote 0
                            • C
                              cmb
                              last edited by

                              Ermal has access to a system on my network that's now broken and can work from that.

                              1 Reply Last reply Reply Quote 0
                              • P
                                Pertan
                                last edited by

                                It looks like it's still broken with the April 17th snapshot. I get a IP from my ISP tunnel, but i cant ping any other machine on the internet using ping6 through ssh.

                                Country: Sweden | ISP: Telia FiberLAN

                                1 Reply Last reply Reply Quote 0
                                • M
                                  MaxPF
                                  last edited by

                                  I have the same issue with 6RD tunnel on Rogers.

                                  1 Reply Last reply Reply Quote 0
                                  • D
                                    ddggttff3
                                    last edited by

                                    Still not working with charter 6rd as of the May 10th build. Any updates on this?

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      survive
                                      last edited by

                                      Hi ddggttff3,

                                      The ticket I opened back on 3\15 was accepted, but hasn't been touched since. The only thing I've heard (via another post) is that they have a box that exhibits the same issue at the shop & they can work on it in-house, so there's no need for remote access to a customer machine.

                                      -Will

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        maxinfo
                                        last edited by

                                        Anyone know where I can find the January 27th snapshot to revert so I can test the 6RD with it? I'm running it with Centrylink/Quest.

                                        1 Reply Last reply Reply Quote 0
                                        • swinnS
                                          swinn
                                          last edited by

                                          @maxinfo:

                                          Anyone know where I can find the January 27th snapshot to revert so I can test the 6RD with it? I'm running it with Centrylink/Quest.

                                          I have the Jan 22 x86 build if you want it. 6RD was working with it. If I remember right, it broke with the 1/24/13 build.

                                          1 Reply Last reply Reply Quote 0
                                          • M
                                            maxinfo
                                            last edited by

                                            Yea I'd love to give it a shot. Can you PM me a dropbox link or something similar?

                                            Thanks much

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.