IPv6 Segment Routing Testing
This page is currently under development and is unstable...
This page is testing the ability of a SRH (segment router header in IPv6) to reach you. If anything on the path between this server (located in France at OVH) and your browser blocks an ICMPv6 ECHO_REQUEST or UDP packet to the 'echo' port, then it will fail. This includes CPE firewalls as well as host firewalls.
Segment routing is described at: https://www.segment-routing.net/.
Your IP address is: 2600:1f28:365:80b0:36bf:af88:36d3:5592.
As you have an IPv6 address, we are now testing whether a SRH packet can reach you...
- Plain ICMPv6 ECHO_REQUEST test without any extension header to test your setting:
Loading...
- ICMPv6 ECHO_REQUEST with a Segment Routing Header and segment left == 0:
Loading...
- ICMPv6 ECHO_REQUEST with a Segment Routing Header and segment left == 1 (should fail):
Loading...
- ICMPv6 ECHO_REQUEST with a Routing Header type 0 (should fail):
Loading...
- ICMPv6 ECHO_REQUEST with a Hop-by-Hop extension header (should fail):
Loading...
- ICMPv6 ECHO_REQUEST with a Destination extension header (should succeed):
Loading...
Blocking hosts
For example, on Mac OS/X the default policy blocks inbound ICMP (do not ask me why!). You may want to briefly disabled the Mac OS/X firewall by typing in a Terminal window: sudo pfctl -d and then re-enabled the firewall sudo pfctl -e.
This page has been developped by Eric Vyncke, March 2014.