DNS: % host archive.raspberrypi.org. archive.raspberrypi.org is an alias for lb.raspberrypi.org. lb.raspberrypi.org has address 93.93.130.214 lb.raspberrypi.org has address 93.93.135.188 lb.raspberrypi.org has address 46.235.227.11 lb.raspberrypi.org has address 93.93.128.133 lb.raspberrypi.org has address 93.93.128.211 lb.raspberrypi.org has address 93.93.128.230 lb.raspberrypi.org has address 93.93.130.39 lb.raspberrypi.org has address 93.93.130.104 lb.raspberrypi.org has IPv6 address 2a00:1098:0:82:1000:13:0:9 lb.raspberrypi.org has IPv6 address 2a00:1098:0:80:1000:13:0:5 lb.raspberrypi.org has IPv6 address 2a00:1098:0:80:1000:13:0:6 lb.raspberrypi.org has IPv6 address 2a00:1098:0:80:1000:13:0:7 lb.raspberrypi.org has IPv6 address 2a00:1098:0:80:1000:13:0:8 lb.raspberrypi.org has IPv6 address 2a00:1098:0:82:1000:13:0:5 lb.raspberrypi.org has IPv6 address 2a00:1098:0:82:1000:13:0:6 lb.raspberrypi.org has IPv6 address 2a00:1098:0:82:1000:13:0:7 Known to work: 2a00:1098:0:82:1000:13:0:9 <--- see try 2 below 2a00:1098:0:80:1000:13:0:6 2a00:1098:0:82:1000:13:0:6 Known to NOT work: 2a00:1098:0:80:1000:13:0:5 2a00:1098:0:80:1000:13:0:7 2a00:1098:0:80:1000:13:0:8 2a00:1098:0:82:1000:13:0:5 <--- see try 1 below 2a00:1098:0:82:1000:13:0:7 >>>> TRY 1: FAIL <<<< (bogon:15:12:EDT)% mtr --report --report-cycles=4 --report-wide 2a00:1098:0:82:1000:13:0:5 Start: 2018-04-23T15:12:53-0400 HOST: bogon Loss% Snt Last Avg Best Wrst StDev 1.|-- et2.nat.prolixium.net 0.0% 4 0.3 0.3 0.3 0.3 0.0 2.|-- gi2.dax.prolixium.net 0.0% 4 8.2 7.0 5.9 8.2 1.0 3.|-- vb0.excalibur.prolixium.net 0.0% 4 7.0 7.3 6.9 8.1 0.5 4.|-- choopa.prolixium.net 0.0% 4 18.5 12.8 7.2 18.5 5.9 5.|-- vl164-br1.pnj1.choopa.net 0.0% 4 45.1 20.3 6.7 45.1 17.4 6.|-- vl39-er2.pnj1.choopa.net 0.0% 4 6.7 8.6 6.7 10.3 1.8 7.|-- 2001:550:2:be::7:1 0.0% 4 13.2 38.3 6.9 122.2 56.0 8.|-- be3551.rcr21.ewr06.atlas.cogentco.com 0.0% 4 9.8 66.4 9.8 123.4 65.2 9.|-- be3118.rcr21.ewr02.atlas.cogentco.com 0.0% 4 118.9 108.4 9.5 185.3 72.9 10.|-- be2600.rcr23.jfk01.atlas.cogentco.com 0.0% 4 190.8 98.4 9.3 190.8 102.7 11.|-- 2a00:1098:2::5d5d:8562 0.0% 4 9.5 142.5 9.5 188.6 88.7 12.|-- hex-lb-2.raspberrypi.org 25.0% 4 78.7 150.7 78.7 187.2 62.4 (bogon:15:13:EDT)% Client @ 2620:6:2000:103:201:3ff:fede:64d6 (Ethernet: MTU 1500) Target IPv6: 2a00:1098:0:82:1000:13:0:5 ---------------------------------------------------------------- (bogon:14:54:EDT)% curl --resolve "archive.raspberrypi.org:80:[2a00:1098:0:82:1000:13:0:5]" -o /dev/null -v http://archive.raspberrypi.org/debian/dists/stretch/main/Contents-armhf.gz * Added archive.raspberrypi.org:80:2a00:1098:0:82:1000:13:0:5 to DNS cache * Hostname archive.raspberrypi.org was found in DNS cache * Trying 2a00:1098:0:82:1000:13:0:5... * TCP_NODELAY set % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to archive.raspberrypi.org (2a00:1098:0:82:1000:13:0:5) port 80 (#0) 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0> GET /debian/dists/stretch/main/Contents-armhf.gz HTTP/1.1 > Host: archive.raspberrypi.org > User-Agent: curl/7.58.0 > Accept: */* > < HTTP/1.1 200 OK < Date: Mon, 23 Apr 2018 18:54:23 GMT < Server: Apache/2.2.22 (Debian) < Last-Modified: Mon, 23 Apr 2018 09:38:33 GMT < ETag: "264137-8ae31-56a80cd1ad840" < Accept-Ranges: bytes < Content-Length: 568881 < Connection: close < Content-Type: application/x-gzip < 0 555k 0 0 0 0 0 0 --:--:-- 0:01:18 --:--:-- 0 Ingress Router (ISP: Arpnetworks) ---------------------------------------------------------------- (trident:11:53:PDT)% sudo tcpdump -n -i eth0 "(ip6[40] == 2) or ip6 net 2a00:1098::/32" tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 11:54:23.592131 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [S.], seq 368770633, ack 2375102421, win 14280, options [mss 1440,sackOK,TS val 97689145 ecr 3185442078,nop,wscale 7], length 0 11:54:23.764688 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], ack 131, win 120, options [nop,nop,TS val 97689188 ecr 3185442122], length 0 11:54:23.765921 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [P.], seq 1:270, ack 131, win 120, options [nop,nop,TS val 97689189 ecr 3185442122], length 269: HTTP: HTTP/1.1 200 OK 11:54:23.765978 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 270:3126, ack 131, win 120, options [nop,nop,TS val 97689189 ecr 3185442122], length 2856: HTTP 11:54:23.766026 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:23.766056 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 3126:5982, ack 131, win 120, options [nop,nop,TS val 97689189 ecr 3185442122], length 2856: HTTP 11:54:23.766075 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:23.766095 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 5982:7410, ack 131, win 120, options [nop,nop,TS val 97689189 ecr 3185442122], length 1428: HTTP 11:54:23.766112 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:23.943839 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 8462:9890, ack 131, win 120, options [nop,nop,TS val 97689233 ecr 3185442168], length 1428: HTTP 11:54:23.943900 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:23.943951 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 9890:12746, ack 131, win 120, options [nop,nop,TS val 97689233 ecr 3185442168], length 2856: HTTP 11:54:23.943979 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:23.944036 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 12746:15602, ack 131, win 120, options [nop,nop,TS val 97689233 ecr 3185442168], length 2856: HTTP 11:54:23.944057 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:23.948752 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 270:1698, ack 131, win 120, options [nop,nop,TS val 97689234 ecr 3185442168], length 1428: HTTP 11:54:23.948780 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:24.449530 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 270:1698, ack 131, win 120, options [nop,nop,TS val 97689360 ecr 3185442168], length 1428: HTTP 11:54:24.449589 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:25.458230 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 270:1698, ack 131, win 120, options [nop,nop,TS val 97689612 ecr 3185442168], length 1428: HTTP 11:54:25.458290 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:27.477649 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 270:1698, ack 131, win 120, options [nop,nop,TS val 97690117 ecr 3185442168], length 1428: HTTP 11:54:27.477754 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:31.522542 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 270:1698, ack 131, win 120, options [nop,nop,TS val 97691128 ecr 3185442168], length 1428: HTTP 11:54:31.522643 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:33.775819 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [FP.], seq 15602:16654, ack 131, win 120, options [nop,nop,TS val 97691691 ecr 3185442168], length 1052: HTTP 11:54:39.602904 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 270:1698, ack 131, win 120, options [nop,nop,TS val 97693148 ecr 3185444668], length 1428: HTTP 11:54:39.602998 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:54:55.747835 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 270:1698, ack 131, win 120, options [nop,nop,TS val 97697184 ecr 3185444668], length 1428: HTTP 11:54:55.747909 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:55:28.065717 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], seq 270:1698, ack 131, win 120, options [nop,nop,TS val 97705264 ecr 3185444668], length 1428: HTTP 11:55:28.065773 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:5: ICMP6, packet too big, mtu 1280, length 1240 11:55:34.067636 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [.], ack 131, win 120, options [nop,nop,TS val 97706762 ecr 3185444668], length 0 11:56:35.755055 IP6 2a00:1098:0:82:1000:13:0:5.80 > 2620:6:2000:103:201:3ff:fede:64d6.40004: Flags [R], seq 368770903, win 0, length 0 Egress router (ISP: Choopa LLC) ---------------------------------------------------------------- (excalibur:14:53:EDT)% sudo tcpdump -n -i eth0 "(ip6[40] == 2) or ip6 net 2a00:1098::/32" tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 14:54:23.487269 IP6 2620:6:2000:103:201:3ff:fede:64d6.40004 > 2a00:1098:0:82:1000:13:0:5.80: Flags [S], seq 2375102420, win 28800, options [mss 1440,sackOK,TS val 3185442078 ecr 0,nop,wscale 7], length 0 14:54:23.655717 IP6 2620:6:2000:103:201:3ff:fede:64d6.40004 > 2a00:1098:0:82:1000:13:0:5.80: Flags [.], ack 368770634, win 225, options [nop,nop,TS val 3185442122 ecr 97689145], length 0 14:54:23.660046 IP6 2620:6:2000:103:201:3ff:fede:64d6.40004 > 2a00:1098:0:82:1000:13:0:5.80: Flags [P.], seq 0:130, ack 1, win 225, options [nop,nop,TS val 3185442122 ecr 97689145], length 130: HTTP: GET /debian/dists/stretch/main/Contents-armhf.gz HTTP/1.1 14:54:23.838663 IP6 2620:6:2000:103:201:3ff:fede:64d6.40004 > 2a00:1098:0:82:1000:13:0:5.80: Flags [.], ack 270, win 234, options [nop,nop,TS val 3185442168 ecr 97689189], length 0 14:54:23.843790 IP6 2620:6:2000:103:201:3ff:fede:64d6.40004 > 2a00:1098:0:82:1000:13:0:5.80: Flags [.], ack 270, win 256, options [nop,nop,TS val 3185442168 ecr 97689189,nop,nop,sack 1 {7410:8462}], length 0 14:54:33.841629 IP6 2620:6:2000:103:201:3ff:fede:64d6.40004 > 2a00:1098:0:82:1000:13:0:5.80: Flags [.], ack 270, win 278, options [nop,nop,TS val 3185444668 ecr 97689189,nop,nop,sack 2 {15602:16655}{7410:8462}], length 0 14:55:33.953635 IP6 2620:6:2000:103:201:3ff:fede:64d6.40004 > 2a00:1098:0:82:1000:13:0:5.80: Flags [.], ack 270, win 278, options [nop,nop,TS val 3185459697 ecr 97689189,nop,nop,sack 2 {15602:16655}{7410:8462}], length 0 14:56:35.649298 IP6 2620:6:2000:103:201:3ff:fede:64d6.40004 > 2a00:1098:0:82:1000:13:0:5.80: Flags [.], ack 270, win 278, options [nop,nop,TS val 3185475121 ecr 97689189,nop,nop,sack 2 {15602:16655}{7410:8462}], length 0 >>>> TRY 2: SUCCESS <<<< Client @ 2620:6:2000:103:201:3ff:fede:64d6 (Ethernet: MTU 1500) Target IPv6: 2a00:1098:0:82:1000:13:0:9 ---------------------------------------------------------------- Traceroute: (bogon:15:11:EDT)% mtr --report --report-cycles=4 --report-wide 2a00:1098:0:82:1000:13:0:9 Start: 2018-04-23T15:11:44-0400 HOST: bogon Loss% Snt Last Avg Best Wrst StDev 1.|-- et2.nat.prolixium.net 0.0% 4 0.3 0.3 0.3 0.4 0.0 2.|-- gi2.dax.prolixium.net 0.0% 4 7.4 7.1 6.0 8.3 1.0 3.|-- vb0.excalibur.prolixium.net 0.0% 4 6.8 7.4 6.5 8.4 0.9 4.|-- choopa.prolixium.net 0.0% 4 10.5 10.7 7.4 13.3 2.5 5.|-- vl164-br1.pnj1.choopa.net 0.0% 4 10.1 13.3 8.8 23.2 6.7 6.|-- vl50-er1.pnj1.choopa.net 0.0% 4 6.9 10.0 6.9 18.1 5.4 7.|-- vl43-er1.pnj1.choopa.net 0.0% 4 107.8 37.6 6.5 107.8 47.1 8.|-- 100ge13-1.core1.nyc4.he.net 0.0% 4 9.7 36.9 9.7 115.7 52.5 9.|-- 100ge7-2.core1.lon2.he.net 0.0% 4 10.9 150.8 10.9 224.5 95.3 10.|-- 2a00:1098:2::5d5d:8562 0.0% 4 177.5 190.6 177.5 211.2 15.1 11.|-- be2896.ccr41.jfk02.atlas.cogentco.com 0.0% 4 181.6 95.5 9.9 181.6 98.4 12.|-- lb-hex-4.raspberrypi.org 0.0% 4 175.9 153.9 77.1 182.2 51.3 (bogon:15:02:EDT)% curl --resolve "archive.raspberrypi.org:80:[2a00:1098:0:82:1000:13:0:9]" -o /dev/null -v http://archive.raspberrypi.org/debian/dists/stretch/main/Contents-armhf.gz * Added archive.raspberrypi.org:80:2a00:1098:0:82:1000:13:0:9 to DNS cache * Hostname archive.raspberrypi.org was found in DNS cache * Trying 2a00:1098:0:82:1000:13:0:9... * TCP_NODELAY set % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to archive.raspberrypi.org (2a00:1098:0:82:1000:13:0:9) port 80 (#0) 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0> GET /debian/dists/stretch/main/Contents-armhf.gz HTTP/1.1 > Host: archive.raspberrypi.org > User-Agent: curl/7.58.0 > Accept: */* > < HTTP/1.1 200 OK < Date: Mon, 23 Apr 2018 19:02:13 GMT < Server: Apache/2.4.10 (Debian) < Last-Modified: Mon, 23 Apr 2018 09:38:33 GMT < ETag: "8ae31-56a80cd1ad840" < Accept-Ranges: bytes < Content-Length: 568881 < Connection: close < Content-Type: application/x-gzip < { [1208 bytes data] 100 555k 100 555k 0 0 146k 0 0:00:03 0:00:03 --:--:-- 146k * Closing connection 0 (bogon:15:02:EDT)% Ingress Router (ISP: ARP Networks) ---------------------------------------------------------------- Note: 2607:f2f8:acc0::2 faces ARP Networks (trident:12:01:PDT)% sudo tcpdump -n -i eth0 "(ip6[40] == 2) or ip6 net 2a00:1098::/32" tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 12:02:13.599069 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [S.], seq 3498875505, ack 2134306724, win 28560, options [mss 1440,sackOK,TS val 1037983478 ecr 2360718094,nop,wscale 7], length 0 12:02:13.774002 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], ack 131, win 232, options [nop,nop,TS val 1037983521 ecr 2360718139], length 0 12:02:13.774915 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 1691:3119, ack 131, win 232, options [nop,nop,TS val 1037983522 ecr 2360718139], length 1428: HTTP 12:02:13.775017 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:9: ICMP6, packet too big, mtu 1280, length 1240 12:02:13.775026 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [P.], seq 1:263, ack 131, win 232, options [nop,nop,TS val 1037983522 ecr 2360718139], length 262: HTTP: HTTP/1.1 200 OK 12:02:13.775040 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 263:1691, ack 131, win 232, options [nop,nop,TS val 1037983522 ecr 2360718139], length 1428: HTTP 12:02:13.775054 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:9: ICMP6, packet too big, mtu 1280, length 1240 12:02:13.775056 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 3119:4547, ack 131, win 232, options [nop,nop,TS val 1037983522 ecr 2360718139], length 1428: HTTP 12:02:13.775066 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:9: ICMP6, packet too big, mtu 1280, length 1240 12:02:13.775446 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 4547:7403, ack 131, win 232, options [nop,nop,TS val 1037983522 ecr 2360718139], length 2856: HTTP 12:02:13.775467 IP6 2607:f2f8:acc0::2 > 2a00:1098:0:82:1000:13:0:9: ICMP6, packet too big, mtu 1280, length 1240 12:02:13.907278 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 263:1471, ack 131, win 232, options [nop,nop,TS val 1037983555 ecr 2360718139], length 1208: HTTP 12:02:13.907827 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 1471:2679, ack 131, win 232, options [nop,nop,TS val 1037983555 ecr 2360718139], length 1208: HTTP 12:02:13.907865 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 2679:3119, ack 131, win 232, options [nop,nop,TS val 1037983555 ecr 2360718139], length 440: HTTP 12:02:13.907874 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 3119:5975, ack 131, win 232, options [nop,nop,TS val 1037983555 ecr 2360718139], length 2856: HTTP 12:02:13.907919 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 5975:8831, ack 131, win 232, options [nop,nop,TS val 1037983555 ecr 2360718139], length 2856: HTTP 12:02:13.952656 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 8831:11247, ack 131, win 232, options [nop,nop,TS val 1037983566 ecr 2360718183], length 2416: HTTP 12:02:14.084232 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 11247:11687, ack 131, win 232, options [nop,nop,TS val 1037983599 ecr 2360718216], length 440: HTTP 12:02:14.084339 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 11687:12895, ack 131, win 232, options [nop,nop,TS val 1037983599 ecr 2360718216], length 1208: HTTP 12:02:14.087424 IP6 2a00:1098:0:82:1000:13:0:9.80 > 2620:6:2000:103:201:3ff:fede:64d6.53382: Flags [.], seq 12895:13115, ack 131, win 232, options [nop,nop,TS val 1037983600 ecr 2360718217], length 220: HTTP [snip.. successful data transfer continues] Egress router (ISP: Choopa LLC) ---------------------------------------------------------------- (excalibur:15:01:EDT)% sudo tcpdump -n -i eth0 "(ip6[40] == 2) or ip6 net 2a00:1098::/32" tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 15:02:13.494659 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [S], seq 2134306723, win 28800, options [mss 1440,sackOK,TS val 2360718094 ecr 0,nop,wscale 7], length 0 15:02:13.667967 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 3498875506, win 225, options [nop,nop,TS val 2360718139 ecr 1037983478], length 0 15:02:13.668659 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [P.], seq 0:130, ack 1, win 225, options [nop,nop,TS val 2360718139 ecr 1037983478], length 130: HTTP: GET /debian/dists/stretch/main/Contents-armhf.gz HTTP/1.1 15:02:13.847600 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 263, win 234, options [nop,nop,TS val 2360718183 ecr 1037983522], length 0 15:02:13.979435 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 1471, win 256, options [nop,nop,TS val 2360718216 ecr 1037983555], length 0 15:02:13.981423 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 2679, win 278, options [nop,nop,TS val 2360718217 ecr 1037983555], length 0 15:02:13.981456 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 3119, win 297, options [nop,nop,TS val 2360718217 ecr 1037983555], length 0 15:02:13.983089 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 4327, win 320, options [nop,nop,TS val 2360718217 ecr 1037983555], length 0 15:02:13.983399 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 5535, win 342, options [nop,nop,TS val 2360718217 ecr 1037983555], length 0 15:02:13.983977 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 5975, win 361, options [nop,nop,TS val 2360718218 ecr 1037983555], length 0 15:02:13.983989 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 7183, win 383, options [nop,nop,TS val 2360718218 ecr 1037983555], length 0 15:02:13.984527 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 8391, win 405, options [nop,nop,TS val 2360718218 ecr 1037983555], length 0 15:02:13.985519 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 8831, win 424, options [nop,nop,TS val 2360718218 ecr 1037983555], length 0 15:02:14.025522 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 10039, win 447, options [nop,nop,TS val 2360718228 ecr 1037983566], length 0 15:02:14.026151 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 11247, win 469, options [nop,nop,TS val 2360718228 ecr 1037983566], length 0 15:02:14.150900 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 11687, win 488, options [nop,nop,TS val 2360718260 ecr 1037983599], length 0 15:02:14.153375 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 12895, win 510, options [nop,nop,TS val 2360718260 ecr 1037983599], length 0 15:02:14.159393 IP6 2620:6:2000:103:201:3ff:fede:64d6.53382 > 2a00:1098:0:82:1000:13:0:9.80: Flags [.], ack 13115, win 529, options [nop,nop,TS val 2360718261 ecr 1037983600], length 0 [snip.. successful data transfer continues]