IP fragmented packet delivery✗ The request timed out. Looks like IP fragments failed to be delivered to you.
curl -v -s http://icmpcheckv6.popcount.org/frag -o /dev/null* Trying 2a01:7e01::f03c:91ff:fe16:a2e9...* TCP_NODELAY set* Connected to icmpcheckv6.popcount.org (2a01:7e01::f03c:91ff:fe16:a2e9) port 80 (#0)> GET /frag HTTP/1.1> Host: icmpcheckv6.popcount.org> User-Agent: curl/7.55.1> Accept: */*>< HTTP/1.1 200 OK< Date: Sat, 14 Oct 2017 05:49:38 GMT< Content-Type: text/plain; charset=utf-8< Connection: close< Transfer-Encoding: chunked<{ [14 bytes data]* Recv failure: Connection reset by peer* stopped the pause stream!* Closing connection 0
tcpdump -ni igb0 '(ip[6] & (1<<5)) != 0 or (ip[7] != 0) or (ip[6] & ((1<<5)-1) != 0) or ip6[6] == 44'tcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on igb0, link-type EN10MB (Ethernet), capture size 262144 bytes01:49:38.585841 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 87111905:87112385, ack 4046851107, win 224, options [nop,nop,TS val 1674343770 ecr 2705732609], length 480: HTTP01:49:38.616794 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 1428:1908, ack 1, win 224, options [nop,nop,TS val 1674343770 ecr 2705732609], length 480: HTTP01:49:38.647635 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 2856:3336, ack 1, win 224, options [nop,nop,TS val 1674343770 ecr 2705732609], length 480: HTTP01:49:38.678546 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 4284:4764, ack 1, win 224, options [nop,nop,TS val 1674343770 ecr 2705732609], length 480: HTTP01:49:38.709258 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 5712:6192, ack 1, win 224, options [nop,nop,TS val 1674343770 ecr 2705732609], length 480: HTTP01:49:38.739918 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [P.], seq 7140:7620, ack 1, win 224, options [nop,nop,TS val 1674343770 ecr 2705732609], length 480: HTTP01:49:39.004806 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [P.], seq 7140:7620, ack 1, win 224, options [nop,nop,TS val 1674343896 ecr 2705732747], length 480: HTTP01:49:39.405000 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 0:480, ack 1, win 224, options [nop,nop,TS val 1674344016 ecr 2705732747], length 480: HTTP01:49:40.205523 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 0:480, ack 1, win 224, options [nop,nop,TS val 1674344256 ecr 2705732747], length 480: HTTP01:49:41.805125 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 0:480, ack 1, win 224, options [nop,nop,TS val 1674344736 ecr 2705732747], length 480: HTTP01:49:45.111728 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 0:480, ack 1, win 224, options [nop,nop,TS val 1674345728 ecr 2705732747], length 480: HTTP01:49:51.511640 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 0:480, ack 1, win 224, options [nop,nop,TS val 1674347648 ecr 2705732747], length 480: HTTP01:50:04.311778 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 0:480, ack 1, win 224, options [nop,nop,TS val 1674351488 ecr 2705732747], length 480: HTTP01:50:30.338806 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 0:480, ack 1, win 224, options [nop,nop,TS val 1674359296 ecr 2705732747], length 480: HTTP01:51:21.539176 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > xxx: frag (0|512) 80 > 47493: Flags [.], seq 0:480, ack 1, win 224, options [nop,nop,TS val 1674374656 ecr 2705732747], length 480: HTTP
✓ All good! ICMP path MTU message was successfully delivered to you.
curl -v -s http://icmpcheck.popcount.org/frag -o /dev/null* Hostname was NOT found in DNS cache* Trying 139.162.188.91...* Connected to icmpcheck.popcount.org (139.162.188.91) port 80 (#0)> GET /frag HTTP/1.1> User-Agent: curl/7.37.0> Host: icmpcheck.popcount.org> Accept: */*> < HTTP/1.1 200 OK< Date: Sat, 14 Oct 2017 06:33:23 GMT< Content-Type: text/plain; charset=utf-8< Connection: close< Transfer-Encoding: chunked< { [data not shown]* Closing connection 0
curl -v -s http://icmpcheck.popcount.org/icmp --data @payload.bin* About to connect() to icmpcheck.popcount.org port 80 (#0)* Trying 139.162.188.91...* Connected to icmpcheck.popcount.org (139.162.188.91) port 80 (#0)> POST /icmp HTTP/1.1> User-Agent: curl/7.29.0> Host: icmpcheck.popcount.org> Accept: */*> Content-Length: 8100> Content-Type: application/x-www-form-urlencoded> Expect: 100-continue> < HTTP/1.1 100 Continue< HTTP/1.1 200 OK< Date: Sat, 14 Oct 2017 06:39:44 GMT< Content-Type: text/plain; charset=utf-8< Connection: close< Transfer-Encoding: chunked< {"msg1": "Upload complete", "mtu":1500, "lost_segs":0, "retrans_segs":0, "total_retrans_segs":0, "reord_segs":3, "snd_mss":1448, "rcv_mss":853}* Closing connection 0
tcpdump -ni eth0 '(ip[6] & (1<<5)) != 0 or (ip[7] != 0) or (ip[6] & ((1<<5)-1) != 0) or ip6[6] == 44' tcpdump: verbose output suppressed, use -v or -vv for full protocol decodelistening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes08:29:26.318081 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (0|512) 80 > 35338: Flags [.], seq 998043207:998043687, ack 1367675351, win 232, options [nop,nop,TS val 1675060106 ecr 23061848], length 480: HTTP08:29:26.318109 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (512|512)08:29:26.318112 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (1024|221)08:29:26.348688 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (0|512) 80 > 35338: Flags [.], seq 1213:1693, ack 1, win 232, options [nop,nop,TS val 1675060106 ecr 23061848], length 480: HTTP08:29:26.348723 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (512|512)08:29:26.348727 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (1024|221)08:29:26.379326 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (0|512) 80 > 35338: Flags [.], seq 2426:2906, ack 1, win 232, options [nop,nop,TS val 1675060106 ecr 23061848], length 480: HTTP08:29:26.379360 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (512|512)08:29:26.379363 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (1024|221)08:29:26.409898 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (0|512) 80 > 35338: Flags [.], seq 3639:4119, ack 1, win 232, options [nop,nop,TS val 1675060106 ecr 23061848], length 480: HTTP08:29:26.409934 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (512|512)08:29:26.409937 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (1024|221)08:29:26.440536 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (0|512) 80 > 35338: Flags [.], seq 4852:5332, ack 1, win 232, options [nop,nop,TS val 1675060106 ecr 23061848], length 480: HTTP08:29:26.440572 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (512|512)08:29:26.440575 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (1024|221)08:29:26.471076 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (0|512) 80 > 35338: Flags [.], seq 6065:6545, ack 1, win 232, options [nop,nop,TS val 1675060106 ecr 23061848], length 480: HTTP08:29:26.471111 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (512|512)08:29:26.471114 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (1024|221)08:29:26.501395 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (0|512) 80 > 35338: Flags [P.], seq 7278:7758, ack 1, win 232, options [nop,nop,TS val 1675060106 ecr 23061848], length 480: HTTP08:29:26.501411 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (512|512)08:29:26.501414 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (1024|80)
ICMP path MTU packet delivery✓ All good! ICMP path MTU message was successfully delivered to you.
curl -v -s http://icmpcheck.popcount.org/frag -o /dev/null* Hostname was NOT found in DNS cache* Trying 139.162.188.91...
curl -v -s http://icmpcheckv6.popcount.org/frag -o /dev/null
...08:29:26.318081 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (0|512) 80 > 35338: Flags [.], seq 998043207:998043687, ack 1367675351, win 232, options [nop,nop,TS val 1675060106 ecr 23061848], length 480: HTTP08:29:26.318109 IP6 2a01:7e01::f03c:91ff:fe16:a2e9 > 2a01:e0a:6e:c111:be5f:f4ff:fe62:99c5: frag (512|512)...
✓ All good! IP fragments were successfully delivered to your host.
curl -v -s http://icmpcheckv6.popcount.org/frag -o /dev/null* Hostname was NOT found in DNS cache* Trying 2a01:7e01::f03c:91ff:fe16:a2e9...* Connected to icmpcheckv6.popcount.org (2a01:7e01::f03c:91ff:fe16:a2e9) port 80 (#0)> GET /frag HTTP/1.1> User-Agent: curl/7.37.0> Host: icmpcheckv6.popcount.org> Accept: */*> < HTTP/1.1 200 OK< Date: Sat, 14 Oct 2017 17:38:33 GMT< Content-Type: text/plain; charset=utf-8< Connection: close< Transfer-Encoding: chunked< { [data not shown]* Closing connection 0