netdev
[Top] [All Lists]

Re: 2.4.21+ - IPv6 over IPv4 tunneling b0rked

To: linux-kernel@xxxxxxxxxxxxxxx
Subject: Re: 2.4.21+ - IPv6 over IPv4 tunneling b0rked
From: Andre Tomt <andre@xxxxxxxx>
Date: 11 Jul 2003 03:49:14 +0200
Cc: Mika Liljeberg <mika.liljeberg@xxxxxxxxx>, netdev@xxxxxxxxxxx
In-reply-to: <1057881869.3588.10.camel@hades>
References: <20030710154302.GE1722@zip.com.au> <1057854432.3588.2.camel@hades> <20030710233931.GG1722@zip.com.au> <1057881869.3588.10.camel@hades>
Sender: netdev-bounce@xxxxxxxxxxx
On fre, 2003-07-11 at 02:04, Mika Liljeberg wrote:
> Well, the thing is that prefix:: is a special anycast address that
> identifies a router on the link prefix::/n, where n is the prefix
> length. You had configured a 127-bit link prefix, meaning that you had
> only one valid unicast address (last bit == 1) in addition to the router
> anycast address (last bit == 0).

Thanks for the explanation, I've been struggling to understand what
Yoshfuji tried to explain to me earlier on this topic (see "IPv6 bugs
introduced in 2.4.21" - ie. my bogus bugreport), now it all makes
perfect sense :-)

> Normally, IPv6 networks are supposed to use 64-bit on-link prefixes but
> the implementation can be written in such a way that other prefix
> lengths can be configured.
> 
> Setting your tunnel prefix to /64 is certainly the right thing to do. 

If you don't have anything but one /64 for example.. I guess /126's
would be ok as you could rule out the the anycast address? It will
probably work with Linux - but is it wrong in any sense, other than
"breaking" with EUI-64/autoconfiguration?

-- 
Cheers,
André Tomt
andre@xxxxxxxx


<Prev in Thread] Current Thread [Next in Thread>