Re: Is it possible to block ipv6 auto configuration entering the tinc tunnel?

Håvard Rabbe hrabbe at
Wed Feb 22 21:51:49 CET 2017

thank you for looking in to this. I haven't tried it before now. I cant get it to work.

after running the commands you suggest I get this when I run ip6tables --list-rules

root at JOTVPN:~# ip6tables --list-rules
-A FORWARD -i vpn -p ipv6-icmp -m icmp6 --icmpv6-type 133 -j DROP
-A FORWARD -o vpn -p ipv6-icmp -m icmp6 --icmpv6-type 134 -j DROP

Do you have any other ideas?
Thanks for your help!

Best Regards,

Håvard Rabbe

On Aug 30, 2016, at 04:39 PM, Guus Sliepen <guus at> wrote:

On Sat, Aug 27, 2016 at 11:41:12PM +0000, Håvard Rabbe wrote:

Im using tinc to bridge networks together. And im using ebtables to block dhcp traffic for ipv4 on each node in tinc. One of my nodes have recently began using ipv6. The isp is using auto configuration to give out ipv6 addresses. The problem is that every computer in my bridged network is getting ipv6 addresses from that node.
The other computers behind the other nodes have no use for ipv6 addresses it gets through the tinc tunnel.

Is there a way to block ipv6 auto configuration traffic entering the tinc tunnel on each node?

You should be able to block those packets in the FORWARD chain. IPv6
autoconfiguration is done using ICMPv6 packets with types 133 and 134,
see: So do
something like:

ip6tables -A FORWARD -i <vpn interface> -p icmpv6 --icmpv6-type 133 -j DROP
ip6tables -A FORWARD -o <vpn interface> -p icmpv6 --icmpv6-type 134 -j DROP

Met vriendelijke groet / with kind regards,
Guus Sliepen <guus at>
tinc mailing list
tinc at
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: not available
URL: <>

More information about the tinc mailing list