[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Receiving ICMP6 Checksum Errors



Dear George:
  I am afraid this is sent out from CERNET IPv6 Testbed in China, 
but  without any wicked intention. We have built tunnels with ETRI in 
Korea and now we are running BGP4+ between CERNETand ETRI
with Zebra, and the errors are spread out from the tunnel end point 
of ours.
  Sorry for the problems. I think this is the kernel defection, but could 
anyone give us some advice on how to deal with this? Just modifying
 the bgpd.conf or we have to rebuild the kernel? Thanks.
  Best
Haisang
  

  ______________________________________________
    Haisang Wu 
    CERNET IPv6 Testbed Operation Team
    Central Mainbuilding    Room 307 
    Tsinghua University     Beijing   P.R.China 
    Postalcode: 100084     
    Phone: 62785814-525(O)  MP: 13011868154
    email: [email protected]
  ______________________________________________ 	
    
   

> -----Original Message-----
> From: [email protected] [mailto:[email protected]]On Behalf Of
> [email protected]
> Sent: Wednesday, March 07, 2001 8:39 PM
> To: [email protected]
> Subject: Receiving ICMP6 Checksum Errors
> 
> 
> I'm getting sporadic log entries informing me that I'm receiving ICMP6
> checksum errors from 3ffe:3200:0001:0006::0001.  I used whois to get the
> name of a responsible person and I sent him email, but there has been no
> response.  Is this happening to anyone else?  It's hard to believe that
> there's anything nefarious going on, but I'm curious, at the least,
> whose kernel (or application using raw sockets, I guess) is sending out
> these malformed packets.                             -- George Mitchell
>