Carlos E. R. wrote:
Telcontar:~ # tshark -i eth0 -Y icmpv6.type==134 -V icmp6 > tshark_capture Running as user "root" and group "root". This could be dangerous. Capturing on 'eth0' ** (tshark:25609) 14:57:14.589158 [Main MESSAGE] -- Capture started. ** (tshark:25609) 14:57:14.589229 [Main MESSAGE] -- File: "/tmp/wireshark_eth07WWD41.pcapng" 3 ^C Telcontar:~ # l /tmp/wireshark_eth07WWD41.pcapng ls: cannot access '/tmp/wireshark_eth07WWD41.pcapng': No such file or directory Telcontar:~ # susepaste -n "Carlos E R" -t "capture tshark" -e 40320 tshark_capture Pasted as: https://susepaste.org/35e4671eb5dc https://paste.opensuse.org/35e4671eb5dc
So your router is spitting out unsolicited RAs just four seconds apart :-) Certainly unusual, but I don't think it's a problem. 30 second lifetime for the DNS servers certainly seems very short, but your /run/netconfig/resolv.conf is being updated on every RA, right? Your initial post showed 5-8-11 seconds between dnsmasq reloads. I'm running out of ideas. I don't see (m)any unsolicited RAs on my system, maybe I'll have to run a trace for much longer. Wild guessing - is there any reason to think wicked would treat an unsolicited RA differently to one sent in response to a Router Solicitation? -- Per Jessen, Zürich (23.4°C) Member, openSUSE Heroes (2016 - present) We're hiring - https://en.opensuse.org/openSUSE:Heroes