not really since it stops redirection of packets that are actually properly being redirected. Instead of redirect, all packets not destined for the "Router" would be dropped, when it seems it is a specifically marked packet that is causing the problem. I imagine the issue could be resolved with a simple wireshark inspection of packet markings, and firewall blocking the bad packet type.
1) The firewall cannot tell ahead of time that a query is going to result in an NXDOMAIN
2) NXDOMAIN is a valid response, and is not the same as not getting any response at all.
The only possibilities are either to resolve the checksum issue, or to stop redirecting queries to the router. Since the first one seems impossible to do, then the only solution is the latter.
tested again, full reset. 2x Ax86u AImesh ethernet backhaul. on 2.4, certain older wifi devices wouldnt connect or stuggle to connect / stay on. back down to 5_2 again and everything is perfect. same issue with official asus firmware.
1) The firewall cannot tell ahead of time that a query is going to result in an NXDOMAIN
2) NXDOMAIN is a valid response, and is not the same as not getting any response at all.
The only possibilities are either to resolve the checksum issue, or to stop redirecting queries to the router. Since the first one seems impossible to do, then the only solution is the latter.
What do you think you know about what to block? I feel like you’re misunderstanding the problem. The individual domain name doesn’t matter. I even reproduced it with router.asus.com.
explain why some redirects clearly work no problem, and some don't? are we looking at an issue of packet size, query type, or what? I am inviting you to break out the ol'@dave14305 chalk board and break it down instead of us creating a party of destructive criticism. I pulled out wireshark and I am literally inspecting packets that are working with redirect, and no kernel arguements. And I am also examining the one that clearly breaks on checksum.
explain why some redirects clearly work no problem, and some don't? are we looking at an issue of packet size, query type, or what? I am inviting you to break out the ol'@dave14305 chalk board and break it down instead of us creating a party of destructive criticism. I pulled out wireshark and I am literally inspecting packets that are working with redirect, and no kernel arguements. And I am also examining the one that clearly breaks on checksum.
I did note an interesting difference in my testing. If I run nslookup interactively, manually setting the server and entering the query at the nslookup “prompt”, I don’t get the kernel messages. If I put it all on one line, I do get the kernel messages. Using PowerShell Resolve-DnsName works fine.
I did note an interesting difference in my testing. If I run nslookup interactively, manually setting the server and entering the query at the nslookup “prompt”, I don’t get the kernel messages. If I put it all on one line, I do get the kernel messages. Using PowerShell Resolve-DnsName works fine.
I did note an interesting difference in my testing. If I run nslookup interactively, manually setting the server and entering the query at the nslookup “prompt”, I don’t get the kernel messages. If I put it all on one line, I do get the kernel messages. Using PowerShell Resolve-DnsName works fine.
I'm curious as to what "zero need for it" means in the context of IPv4 v. IPv6 means. Assuming one can get IPv4 addresses from an available IPv4 pool, why would anyone need IPv6? In other words, if someone has no need for it, why would anyone have need for it unless they're in some extremely unique environment?
I did note an interesting difference in my testing. If I run nslookup interactively, manually setting the server and entering the query at the nslookup “prompt”, I don’t get the kernel messages. If I put it all on one line, I do get the kernel messages. Using PowerShell Resolve-DnsName works fine.
Since I started using IPv6 I noticed the following kernel error: Thu Aug 18 15:05:01 2016] <unknown>: hw csum failure [Thu Aug 18 15:05:01 2016] CPU: 5 PID: 11086 Comm: Chrome_IOThread Tainted: P OE 4.4.0-34-generic #53-Ubuntu [Thu Aug 18 15:05:01 2016] Hardware name: Gigabyte...
BugLink: https://bugs.launchpad.net/bugs/1840854 [Impact] On machines equipped with Mellanox NIC's, in this particular case, Mellanox 5 series NICs using the mlx5_core driver, after installing 4.15.0-56 or later there is the following kernel splat: bond0: hw csum failure CPU: 63 PID: 2473...
After working on IP defragmentation lately, I found that some large packets defeat CHECKSUM_COMPLETE optimization because of NIC adding zero paddings on the last (small) fragment. While removing t...
When an ethernet frame is padded to meet the minimum ethernet frame size, the padding octets are not covered by the hardware checksum. Fortunately the padding octets are usually zero's, which d...
When an ethernet frame is padded to meet the minimum ethernet frame size, the padding octets are not covered by the hardware checksum. Fortunately the padding octets are usually zero's, which d...
Since I started using IPv6 I noticed the following kernel error: Thu Aug 18 15:05:01 2016] <unknown>: hw csum failure [Thu Aug 18 15:05:01 2016] CPU: 5 PID: 11086 Comm: Chrome_IOThread Tainted: P OE 4.4.0-34-generic #53-Ubuntu [Thu Aug 18 15:05:01 2016] Hardware name: Gigabyte...
BugLink: https://bugs.launchpad.net/bugs/1840854 [Impact] On machines equipped with Mellanox NIC's, in this particular case, Mellanox 5 series NICs using the mlx5_core driver, after installing 4.15.0-56 or later there is the following kernel splat: bond0: hw csum failure CPU: 63 PID: 2473...
After working on IP defragmentation lately, I found that some large packets defeat CHECKSUM_COMPLETE optimization because of NIC adding zero paddings on the last (small) fragment. While removing t...
When an ethernet frame is padded to meet the minimum ethernet frame size, the padding octets are not covered by the hardware checksum. Fortunately the padding octets are usually zero's, which d...
When an ethernet frame is padded to meet the minimum ethernet frame size, the padding octets are not covered by the hardware checksum. Fortunately the padding octets are usually zero's, which d...
Anyway, I feel bad begging @SomeWhereOverTheRainBow to generously write scripts in order to enable two ipv6 dns servers to be sent from the router to all devices so it would be great to have that functionality built in.