Please see packet 4 of the atached capture
�
In my opinion checksum 0xc343 is actually
correct, since it is calculated using the final destination
address 4ea1:2222:2222::11, but wireshark reports 0x2e12 as
correct, which is the result of the checksum calculation if
the address from the extension header
505:505:505:505:505:505:505:505 is used.
�
Please refer to RFC 2460:
�
������� If the IPv6 packet contains a Routing header, the Destination
��������
Address used in the pseudo-header is that of the
final
��������
destination.� At the
originating node, that address will be in
�������� the
last element of the Routing header; at the recipient(s),
�������� that
address will be in the Destination Address field of the
�������� IPv6
header.
�
In addition, the Linux kernel accepts the
UDP packet.
�
3.4.6 (v3.4.6-0-g6357ac1405b8)
�
Compiled (64-bit) with Qt 5.15.2, with
libpcap, with GLib 2.52.3, with zlib
1.2.11, with SMI 0.4.8, with c-ares 1.15.0,
with Lua 5.2.4, with GnuTLS 3.6.3
and PKCS #11 support, with Gcrypt 1.8.3,
with MIT Kerberos, with MaxMind DB
resolver, with nghttp2 1.39.2, with brotli,
with LZ4, with Zstandard, with
Snappy, with libxml2 2.9.9, with
QtMultimedia, with automatic updates using
WinSparkle 0.5.7, with AirPcap, with
SpeexDSP (using bundled resampler), with
Minizip.
�
Running on 64-bit Windows 10 (2009), build
19043, with Intel(R) Core(TM)
i7-8665U CPU @ 1.90GHz (with SSE4.2), with
32483 MB of physical memory, with
locale German_Germany.utf8, with light
display mode, without HiDPI, with Npcap
version 1.31, based on libpcap version
1.10.1-PRE-GIT, with GnuTLS 3.6.3, with
Gcrypt 1.8.3, with brotli 1.0.2, without
AirPcap, binary plugins supported (21
loaded).
�
Built using Microsoft Visual Studio 2019
(VC++ 14.28, build 29910).