On Mon, Oct 22, 2012 at 10:40 PM, Amos Jeffries <squid3@xxxxxxxxxxxxx> wrote: > If I am reading that correctly you are saying the ICMPv6 'too big' packets > are not going to Squid, but to the client machine? > Which would make it a TPROXY bug, since the outbound connection from Squid > is where the MTU should be lowered at the kernel level. > Or are they *addressed* to the client machine and caught by TPROXY properly > but MTU not respected? Here is a tcpdump taken from my edge router. 2001:snip:9a0a is my client machine. 2001:snip::1 is the LAN interface of the edge router that this dump is from. I enabled v6 on my client and tried to access "google.com" to get these results. 16:04:17.362562 IP6 2001:snip:9a0a.53616 > den03s05-in-x11.1e100.net.www: Flags [S], seq 913579164, win 14400, options [mss 1440,sackOK,TS val 61626579 ecr 0,nop,wscale 7], length 0 16:04:18.358639 IP6 2001:snip:9a0a.53616 > den03s05-in-x11.1e100.net.www: Flags [S], seq 913579164, win 14400, options [mss 1440,sackOK,TS val 61626829 ecr 0,nop,wscale 7], length 0 16:04:18.397759 IP6 den03s05-in-x11.1e100.net.www > 2001:snip:9a0a.53616: Flags [S.], seq 685180099, ack 913579165, win 14280, options [mss 1410,sackOK,TS val 1528504575 ecr 61626829,nop,wscale 6], length 0 16:04:18.397848 IP6 2001:snip:9a0a.53616 > den03s05-in-x11.1e100.net.www: Flags [.], ack 1, win 113, options [nop,nop,TS val 61626838 ecr 1528504575], length 0 16:04:18.398024 IP6 2001:snip:9a0a.53616 > den03s05-in-x11.1e100.net.www: Flags [.], seq 1:1399, ack 1, win 113, options [nop,nop,TS val 61626838 ecr 1528504575], length 1398 16:04:18.398159 IP6 2001:snip:1 > 2001:snip:9a0a: ICMP6, packet too big, mtu 1280, length 1240 16:04:18.398181 IP6 2001:snip:9a0a.53616 > den03s05-in-x11.1e100.net.www: Flags [P.], seq 1399:1742, ack 1, win 113, options [nop,nop,TS val 61626838 ecr 1528504575], length 343 16:04:18.443360 IP6 den03s05-in-x11.1e100.net.www > 2001:snip:9a0a.53616: Flags [.], ack 1, win 224, options [nop,nop,TS val 1528504621 ecr 61626838,nop,nop,sack 1 {1399:1742}], length 0 16:04:18.630661 IP6 2001:snip:9a0a.53616 > den03s05-in-x11.1e100.net.www: Flags [.], seq 1:1399, ack 1, win 113, options [nop,nop,TS val 61626897 ecr 1528504621], length 1398 16:04:18.630839 IP6 2001:snip:1 > 2001:snip:9a0a: ICMP6, packet too big, mtu 1280, length 1240 16:04:19.102673 IP6 2001:snip:9a0a.53616 > den03s05-in-x11.1e100.net.www: Flags [.], seq 1:1399, ack 1, win 113, options [nop,nop,TS val 61627015 ecr 1528504621], length 1398 16:04:19.102849 IP6 2001:snip:1 > 2001:snip:9a0a: ICMP6, packet too big, mtu 1280, length 1240 16:04:20.046674 IP6 2001:snip:9a0a.53616 > den03s05-in-x11.1e100.net.www: Flags [.], seq 1:1399, ack 1, win 113, options [nop,nop,TS val 61627251 ecr 1528504621], length 1398 16:04:20.046851 IP6 2001:snip:1 > 2001:snip:9a0a: ICMP6, packet too big, mtu 1280, length 1240 16:04:21.938682 IP6 2001:snip:9a0a.53616 > den03s05-in-x11.1e100.net.www: Flags [.], seq 1:1399, ack 1, win 113, options [nop,nop,TS val 61627724 ecr 1528504621], length 1398 16:04:21.938867 IP6 2001:snip:1 > 2001:snip:9a0a: ICMP6, packet too big, mtu 1280, length 1240