tcpdump -i pppoe0 -v 'udp port 51820'11:56:10.154486 IP6 (flowlabel 0x7dbda, hlim 47, next-header UDP (17) payload length: 156) aaaa:bbb:cccc:dddd:eeee:ffff:gggg:hhhh.51820 > zeus.localdomain.51820: [udp sum ok] UDP, length 14811:56:10.159561 IP6 (hlim 63, next-header UDP (17) payload length: 100) zeus.localdomain.51820 > aaaa:bbb:cccc:dddd:eeee:ffff:gggg:hhhh.51820: [bad udp cksum 0x6f51 -> 0xe13f!] UDP, length 9211:56:15.269635 IP6 (flowlabel 0x7dbda, hlim 47, next-header UDP (17) payload length: 156) aaaa:bbb:cccc:dddd:eeee:ffff:gggg:hhhh.51820 > zeus.localdomain.51820: [udp sum ok] UDP, length 14811:56:15.274872 IP6 (hlim 63, next-header UDP (17) payload length: 100) zeus.localdomain.51820 > aaaa:bbb:cccc:dddd:eeee:ffff:gggg:hhhh.51820: [bad udp cksum 0x6f51 -> 0x8214!] UDP, length 92
Ich verstehe nicht ganz was "tcpdump" anders macht, als z.B. irgend eine andere Software die sich zu dem Interface verbindet.
pfctl -sr | grep "pass in"
pass in log quick on pppoe0 inet6 proto udp from fe80::/10 port = dhcpv6-client to fe80::/10 port = dhcpv6-client keep statepass in log quick on pppoe0 proto udp from any port = dhcpv6-server to any port = dhcpv6-client keep state