Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Massive HTTP IPv6 connectivity issues

    IPv6
    8
    19
    5.2k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      G.D. Wusser Esq.
      last edited by

      Hi,

      I just enabled IPv6 connectivity on my network, and I am experiencing massive HTTP connectivity issues. More than half of IPv6 websites are unreachable and time out in web browser.

      Attached is what I see in the Firewall logs.

      I tried setting “System-Advanced-Firewall/NAT” Firewall Optimization Options to “conservative,” but that did not help.

      Any ideas?

      091214_pfSense_q.gif
      091214_pfSense_q.gif_thumb

      1 Reply Last reply Reply Quote 0
      • G
        G.D. Wusser Esq.
        last edited by

        Setting the “Clear invalid DF bits instead of dropping the packets” option got rid of the firewall messages above, but unfortunately it did not fix connectivity issues.

        Some sites (such as http://test-ipv6.com/, http://snozzages.com/) I can access just fine. Others (including https://forum.pfsense.org )—not.

        Strange.

        1 Reply Last reply Reply Quote 0
        • C
          Caboosey
          last edited by

          What do see when you do a trace route for the IPv6 addresses?

          1 Reply Last reply Reply Quote 0
          • G
            G.D. Wusser Esq.
            last edited by

            Trace route and ping are fine.

            1 Reply Last reply Reply Quote 0
            • Y
              yon
              last edited by

              me too. i  have the same wrong.

              If you are interested in free peering for clearnet and dn42,contact me !

              1 Reply Last reply Reply Quote 0
              • G
                G.D. Wusser Esq.
                last edited by

                It appears that the immediate reason for connectivity issues is the combination of a low MTU setting on one of my uplinks and insistence of most IPv6 websites on sending large-sized packets.

                But the true culprit is IPv6 boneheaded design that breaks in-transit packet fragmentation.

                I do not know what to do here, other than take an axe to my IPv6 setup, and wait for IPv7.

                1 Reply Last reply Reply Quote 0
                • K
                  kejianshi
                  last edited by

                  I haven't had a single problem - Makes me wonder what we are doing differently.

                  I mean that non-sarcastically.  Mine just seems to work and I can't tell you why yours isn't.

                  I literally read abit online about IPV6 and configure 4 pfsense boxes the next day with different hardware for all.  Some native IPV6.  Some Hurricane electric Gif interfaces.

                  IPv6 is a problem solver for me.  Not sure why yours is giving you so much trouble.

                  1 Reply Last reply Reply Quote 0
                  • G
                    G.D. Wusser Esq.
                    last edited by

                    @kejianshi:

                    I haven't had a single problem - Makes me wonder what we are doing differently.

                    You do not have my uplinks, that is what different. LOL

                    It looks like I can make the IPv6 websites browsing working by setting MSS on the pfSense IPv6 interface to 1220.

                    1 Reply Last reply Reply Quote 0
                    • K
                      kejianshi
                      last edited by

                      Hmmm - So your configuration is very complex?

                      1 Reply Last reply Reply Quote 0
                      • Y
                        yon
                        last edited by

                        @G.D.:

                        @kejianshi:

                        I haven't had a single problem - Makes me wonder what we are doing differently.

                        You do not have my uplinks, that is what different. LOL

                        It looks like I can make the IPv6 websites browsing working by setting MSS on the pfSense IPv6 interface to 1220.

                        thanks! I try setup MSS to 1220, just work..  ;D

                        If you are interested in free peering for clearnet and dn42,contact me !

                        1 Reply Last reply Reply Quote 0
                        • awebsterA
                          awebster
                          last edited by

                          I've had similar problems running dual-stack with IPv6 through HE.net tunnelbroker, and a routed /48.  HTTPS breaks, seems it can't get past the TLS handshake.
                          Oddly, some ipv6 sites always work perfectly, ipv6 test sites, Google, but lots of other HTTPS sites do not (Netflix, forum.pfsense.org).
                          The thing is it was working flawlessly for a while with the MTU field blank on my inside LAN interface, but I had to drop MTU to 1280 to get it working again, so I suspect that someone might be filtering ICMP messages along the way, or <nsa>doing ssl decrypt poorly</nsa>.
                          I will also try MSS suggestion to see if that helps.

                          –
                          Andrew

                          –A.

                          1 Reply Last reply Reply Quote 0
                          • DerelictD
                            Derelict LAYER 8 Netgate
                            last edited by

                            Probably trying to tunnel IPv6 over something that's already tunneling or something.  That second tunnel might be something out in the ISP network somewhere, unbeknownst to the user.

                            I wish more sites would add a little logo somewhere if you're hitting them over IPv6.  I have no idea when I'm using it and when I'm not.  Hmm.  6orNot firefox add-on FTW.

                            Chattanooga, Tennessee, USA
                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                            1 Reply Last reply Reply Quote 1
                            • K
                              kejianshi
                              last edited by

                              I leave the HE tunnel up on the pfsense dashboard so I can see when bandwidth is being pulled through it occasionally.

                              netflix for sure as well as youtube and anything google related defaults to it 100% of time with no issues.

                              1 Reply Last reply Reply Quote 0
                              • awebsterA
                                awebster
                                last edited by

                                Right, which makes sense, modern OSes are supposed to prefer IPv6 over IPv4 when both are available.
                                IPv6 also removes all NAT issues, so that's not what's causing the problem here.
                                What I don't understand, is what is Google doing that is different than Netflix to the point where it never fails over IPv6 when Netflix can't successfully negotiate a TLS handshake to start up a web page???
                                It is almost as if something is doing ICMP filtering and blocking path MTU discovery (like security n00bs were doing at ISPs years ago by blocking ALL ICMP).  I'm pretty sure its not the pfSense because I specifically allow IPv6 ICMP messages, and I'd be surprised if HE.net was filtering ICMP, but with another link that is native dual-stack (ie: not going through a tunnel broker), these issues do not occur.

                                –
                                Andrew

                                –A.

                                1 Reply Last reply Reply Quote 0
                                • DerelictD
                                  Derelict LAYER 8 Netgate
                                  last edited by

                                  @awebster:

                                  Right, which makes sense, modern OSes are supposed to prefer IPv6 over IPv4 when both are available.

                                  I'm pretty torqued at Apple for implementing RFC6555 "Happy Eyeballs" with no way to disable it.

                                  For instance, I never use IPv6 to connect to this site.  I want to know when IPv6 is shaky.

                                  Chattanooga, Tennessee, USA
                                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                  1 Reply Last reply Reply Quote 0
                                  • G
                                    G.D. Wusser Esq.
                                    last edited by

                                    @Derelict:

                                    I'm pretty torqued at Apple for implementing RFC6555 "Happy Eyeballs" with no way to disable it.

                                    For instance, I never use IPv6 to connect to this site.  I want to know when IPv6 is shaky.

                                    Maybe you can disable IPv4 all together? On Windows it is easy to flip IPv4 on and off, no restart required.

                                    1 Reply Last reply Reply Quote 0
                                    • DerelictD
                                      Derelict LAYER 8 Netgate
                                      last edited by

                                      I don't think IPv6 is quite there yet.  :/

                                      "Happy Eyeballs" seems to have been tweaked in 10.9.5.  I'm seeing a lot more green sixes in 6orNot after updating.  (Including this site right now.  :)

                                      Chattanooga, Tennessee, USA
                                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                      1 Reply Last reply Reply Quote 0
                                      • T
                                        tadao
                                        last edited by

                                        This issue occurs when the connection is a PPPoE from provider, this type of connection is almost always MTU 1480 (just look at the router/modem manual).

                                        It seems to work if you let the WAN interface MTU Blank (which usually assumes 1500 bytes, as in any normal Ethernet link), but causes in some cases the issues mentioned in this thread.

                                        It's better not to set MSS in the LAN interface and yes, set ONLY the MTU in the WAN(s) interface(s) AS RECOMMENDED by the provider.

                                        On pfSense:
                                        MTU.png

                                        N 1 Reply Last reply Reply Quote 0
                                        • N
                                          Napsterbater @tadao
                                          last edited by

                                          This thread was 6 years old fyi.

                                          1 Reply Last reply Reply Quote 0
                                          • First post
                                            Last post
                                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.