CAKE w/ DSCPs - cake-qos-simple

Kernel 6.6 from current OpenWRT master is compiled without CONFIG_NETFILTER_EGRESS, so egress filtering doesn't work.

Another dubious thing with netdev ingress/egress filtering is that interfaces have to exist, otherwise nft fails with an error. Can't have a single nftables chain bind to an anonymous set of iifname's and hope it sticks. Some hotplug.d hackery is probably required to make it work in a semi-reliable way, kind of ugly.

2 Likes

can someone help me figure out if my packets are being marked correctly

Use tcpdump. See here:

https://github.com/lynxthecat/cake-qos-simple?tab=readme-ov-file#verifying-correct-operation-and-dscp-handling

 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 OpenWrt 23.05.3, r23809-234f1a2efa
 -----------------------------------------------------
=== WARNING! =====================================
There is no root password defined on this device!
Use the "passwd" command to set up a new password
in order to prevent unauthorized SSH logins.
--------------------------------------------------
root@OpenWrt:~# tcpdump -i wan -vv
tcpdump: listening on wan, link-type EN10MB (Ethernet), snapshot length 262144 b                                                                                        ytes
09:44:50.271106 IP (tos 0x0, ttl 64, id 12228, offset 0, flags [DF], proto ICMP                                                                                         (1), length 84)
    192.168.100.1 > 192.168.100.2: ICMP echo request, id 1, seq 0, length 64
09:44:50.271208 IP (tos 0x0, ttl 64, id 1128, offset 0, flags [none], proto ICMP                                                                                         (1), length 84)
    192.168.100.2 > 192.168.100.1: ICMP echo reply, id 1, seq 0, length 64
09:44:50.271870 IP (tos 0x0, ttl 64, id 12229, offset 0, flags [DF], proto ICMP                                                                                         (1), length 84)
    192.168.100.1 > 192.168.100.2: ICMP echo request, id 1, seq 256, length 64
09:44:50.271907 IP (tos 0x0, ttl 64, id 1129, offset 0, flags [none], proto ICMP                                                                                         (1), length 84)
    192.168.100.2 > 192.168.100.1: ICMP echo reply, id 1, seq 256, length 64
09:44:50.934457 IP (tos 0x28, ttl 46, id 17495, offset 0, flags [DF], proto TCP                                                                                         (6), length 64)
    ec2-34-233-138-108.compute-1.amazonaws.com.443 > 192.168.100.2.53302: Flags                                                                                         [P.], cksum 0x1548 (correct), seq 3191314250:3191314274, ack 4228238793, win 562                                                                                        , length 24
09:44:50.937748 IP (tos 0x0, ttl 127, id 37139, offset 0, flags [DF], proto TCP                                                                                         (6), length 68)
    192.168.100.2.53302 > ec2-34-233-138-108.compute-1.amazonaws.com.443: Flags                                                                                         [P.], cksum 0xdccc (correct), seq 1:29, ack 24, win 508, length 28
09:44:50.961963 IP (tos 0x0, ttl 64, id 8177, offset 0, flags [DF], proto UDP (1                                                                                        7), length 73)
    192.168.100.2.56448 > 192.168.100.1.53: [bad udp cksum 0x499b -> 0xa8ff!] 33                                                                                        23+ PTR? 108.138.233.34.in-addr.arpa. (45)
09:44:51.009925 IP (tos 0x28, ttl 46, id 17496, offset 0, flags [DF], proto TCP                                                                                         (6), length 40)
    ec2-34-233-138-108.compute-1.amazonaws.com.443 > 192.168.100.2.53302: Flags                                                                                         [.], cksum 0xea2a (correct), seq 24, ack 29, win 562, length 0
09:44:51.044841 IP (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto TCP (6),                                                                                         length 88)
    192.168.100.2.64281 > ec2-34-214-147-171.us-west-2.compute.amazonaws.com.443                                                                                        : Flags [P.], cksum 0x9ecd (correct), seq 3480603087:3480603123, ack 3581158606,                                                                                         win 518, options [nop,nop,TS val 2260683014 ecr 2534566065], length 36
09:44:51.125368 IP (tos 0x0, ttl 64, id 51964, offset 0, flags [DF], proto UDP (                                                                                        17), length 129)
    192.168.100.1.53 > 192.168.100.2.56448: [udp sum ok] 3323 q: PTR? 108.138.23                                                                                        3.34.in-addr.arpa. 1/0/0 108.138.233.34.in-addr.arpa. PTR ec2-34-233-138-108.com                                                                                        pute-1.amazonaws.com. (101)
09:44:51.131684 IP (tos 0x0, ttl 64, id 8182, offset 0, flags [DF], proto UDP (1                                                                                        7), length 73)
    192.168.100.2.59773 > 192.168.100.1.53: [bad udp cksum 0x499b -> 0x4f5e!] 21                                                                                        414+ PTR? 171.147.214.34.in-addr.arpa. (45)
09:44:51.141147 IP (tos 0x0, ttl 127, id 49282, offset 0, flags [DF], proto TCP                                                                                         (6), length 68)
    192.168.100.2.53276 > 39.224.186.35.bc.googleusercontent.com.443: Flags [P.]                                                                                        , cksum 0x7e1d (correct), seq 771746296:771746324, ack 3721264194, win 512, leng                                                                                        th 28
09:44:51.190869 IP (tos 0x48, ttl 117, id 15938, offset 0, flags [none], proto T                                                                                        CP (6), length 40)
    39.224.186.35.bc.googleusercontent.com.443 > 192.168.100.2.53276: Flags [.],                                                                                         cksum 0xc23b (correct), seq 1, ack 28, win 272, length 0
09:44:51.199709 IP (tos 0x48, ttl 117, id 15939, offset 0, flags [none], proto T                                                                                        CP (6), length 64)
    39.224.186.35.bc.googleusercontent.com.443 > 192.168.100.2.53276: Flags [P.]                                                                                        , cksum 0x0064 (correct), seq 1:25, ack 28, win 272, length 24
09:44:51.205389 IP (tos 0x28, ttl 235, id 40536, offset 0, flags [DF], proto TCP                                                                                         (6), length 84)
    ec2-34-214-147-171.us-west-2.compute.amazonaws.com.443 > 192.168.100.2.64281                                                                                        : Flags [P.], cksum 0xa4a3 (correct), seq 1:33, ack 36, win 849, options [nop,no                                                                                        p,TS val 2534576062 ecr 2260683014], length 32
09:44:51.249724 IP (tos 0x0, ttl 127, id 49283, offset 0, flags [DF], proto TCP                                                                                         (6), length 40)
    192.168.100.2.53276 > 39.224.186.35.bc.googleusercontent.com.443: Flags [.],                                                                                         cksum 0xc133 (correct), seq 28, ack 25, win 512, length 0
09:44:51.295100 IP (tos 0x0, ttl 64, id 51974, offset 0, flags [DF], proto UDP (                                                                                        17), length 137)
    192.168.100.1.53 > 192.168.100.2.59773: [udp sum ok] 21414 q: PTR? 171.147.2                                                                                        14.34.in-addr.arpa. 1/0/0 171.147.214.34.in-addr.arpa. PTR ec2-34-214-147-171.us                                                                                        -west-2.compute.amazonaws.com. (109)
09:44:51.297443 IP (tos 0x0, ttl 64, id 8195, offset 0, flags [DF], proto UDP (1                                                                                        7), length 72)
    192.168.100.2.48621 > 192.168.100.1.53: [bad udp cksum 0x499a -> 0x7c4d!] 11                                                                                        161+ PTR? 39.224.186.35.in-addr.arpa. (44)
09:44:51.305536 IP (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto TCP (6),                                                                                         length 52)
    192.168.100.2.64281 > ec2-34-214-147-171.us-west-2.compute.amazonaws.com.443                                                                                        : Flags [.], cksum 0x114e (correct), seq 36, ack 33, win 518, options [nop,nop,T                                                                                        S val 2260683275 ecr 2534576062], length 0
09:44:51.424299 IP (tos 0x0, ttl 64, id 51980, offset 0, flags [DF], proto UDP (                                                                                        17), length 124)
    192.168.100.1.53 > 192.168.100.2.48621: [udp sum ok] 11161 q: PTR? 39.224.18                                                                                        6.35.in-addr.arpa. 1/0/0 39.224.186.35.in-addr.arpa. PTR 39.224.186.35.bc.google                                                                                        usercontent.com. (96)
09:44:54.062517 IP (tos 0x0, ttl 64, id 8394, offset 0, flags [DF], proto UDP (17), length 60)
login as: root


BusyBox v1.36.1 (2024-03-22 22:09:42 UTC) built-in shell (ash)

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 OpenWrt 23.05.3, r23809-234f1a2efa
 -----------------------------------------------------
=== WARNING! =====================================
There is no root password defined on this device!
Use the "passwd" command to set up a new password
in order to prevent unauthorized SSH logins.
--------------------------------------------------
root@OpenWrt:~# tcpdump -i ifb-wan -vv
tcpdump: listening on ifb-wan, link-type EN10MB (Ethernet), snapshot length 2621                                                                                        44 bytes
09:47:48.626753 IP (tos 0x80, ttl 45, id 52924, offset 0, flags [DF], proto UDP (17), length 76)
    ntp.speculation.org.123 > 192.168.100.2.45317: [udp sum ok] NTPv4, Server, length 48
        Leap indicator:  (0), Stratum 2 (secondary reference), poll 3 (8s), precision -19
        Root Delay: 0.000839, Root dispersion: 0.026336, Reference-ID: 0xc00c1314
          Reference Timestamp:  3928815413.949167392 (2024-07-01T09:36:53Z)
          Originator Timestamp: 3559815174.965549117 (2012-10-21T13:32:54Z)
          Receive Timestamp:    3928816068.576256006 (2024-07-01T09:47:48Z)
          Transmit Timestamp:   3928816068.576308326 (2024-07-01T09:47:48Z)
            Originator - Receive Timestamp:  +369000893.610706888
            Originator - Transmit Timestamp: +369000893.610759208
09:47:48.683336 IP (tos 0x0, ttl 43, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [S.], cksum 0x23a5 (correct), seq 1887166993, ack 1810143687, win 65535, options [mss 1412,nop,nop,sackOK,nop,wscale 10], length 0
09:47:48.688510 IP (tos 0x0, ttl 43, id 0, offset 0, flags [DF], proto TCP (6), length 52)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [S.], cksum 0xc138 (correct), seq 926659641, ack 248037462, win 65535, options [mss 1412,nop,nop,sackOK,nop,wscale 10], length 0
09:47:48.759940 IP (tos 0x0, ttl 43, id 5860, offset 0, flags [DF], proto TCP (6), length 40)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [.], cksum 0x5c99 (correct), seq 1, ack 1900, win 70, length 0
09:47:48.759961 IP (tos 0x0, ttl 43, id 5861, offset 0, flags [DF], proto TCP (6), length 1452)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [.], cksum 0x26a1 (incorrect -> 0x2a6e), seq 1:1413, ack 1900, win 70, length 1412
09:47:48.760534 IP (tos 0x0, ttl 43, id 5862, offset 0, flags [DF], proto TCP (6), length 1452)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [P.], cksum 0x26a1 (incorrect -> 0x8d1f), seq 1413:2825, ack 1900, win 70, length 1412
09:47:48.761113 IP (tos 0x0, ttl 43, id 5863, offset 0, flags [DF], proto TCP (6), length 707)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [P.], cksum 0x146b (correct), seq 2825:3492, ack 1900, win 70, length 667
09:47:48.764160 IP (tos 0x0, ttl 43, id 52733, offset 0, flags [DF], proto TCP (6), length 40)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [.], cksum 0xfa46 (correct), seq 1, ack 1874, win 70, length 0
09:47:48.768496 IP (tos 0x0, ttl 43, id 52734, offset 0, flags [DF], proto TCP (6), length 1452)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [.], cksum 0x26b2 (incorrect -> 0x315f), seq 1:1413, ack 1874, win 70, length 1412
09:47:48.769071 IP (tos 0x0, ttl 43, id 52735, offset 0, flags [DF], proto TCP (6), length 1452)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [P.], cksum 0x26b2 (incorrect -> 0x7ff2), seq 1413:2825, ack 1874, win 70, length 1412
09:47:48.769656 IP (tos 0x0, ttl 43, id 52736, offset 0, flags [DF], proto TCP (6), length 1278)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [P.], cksum 0xbee8 (correct), seq 2825:4063, ack 1874, win 70, length 1238
09:47:48.835055 IP (tos 0x0, ttl 43, id 5864, offset 0, flags [DF], proto TCP (6), length 119)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [P.], cksum 0x4026 (correct), seq 3492:3571, ack 1964, win 70, length 79
09:47:48.835105 IP (tos 0x0, ttl 43, id 5865, offset 0, flags [DF], proto TCP (6), length 119)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [P.], cksum 0x5735 (correct), seq 3571:3650, ack 1964, win 70, length 79
09:47:48.835145 IP (tos 0x0, ttl 43, id 5866, offset 0, flags [DF], proto TCP (6), length 104)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [P.], cksum 0x6bef (correct), seq 3650:3714, ack 2056, win 70, length 64
09:47:48.836005 IP (tos 0x0, ttl 43, id 5867, offset 0, flags [DF], proto TCP (6), length 40)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [.], cksum 0x49f4 (correct), seq 3714, ack 2954, win 76, length 0
09:47:48.836034 IP (tos 0x0, ttl 43, id 5868, offset 0, flags [DF], proto TCP (6), length 88)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [P.], cksum 0x21e8 (correct), seq 3714:3762, ack 2954, win 76, length 48
09:47:48.843389 IP (tos 0x0, ttl 43, id 52737, offset 0, flags [DF], proto TCP (6), length 119)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [P.], cksum 0xe8af (correct), seq 4063:4142, ack 1938, win 70, length 79
09:47:48.843435 IP (tos 0x0, ttl 43, id 52738, offset 0, flags [DF], proto TCP (6), length 119)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [P.], cksum 0x9d18 (correct), seq 4142:4221, ack 1938, win 70, length 79
09:47:48.843787 IP (tos 0x0, ttl 43, id 52739, offset 0, flags [DF], proto TCP (6), length 104)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [P.], cksum 0x5592 (correct), seq 4221:4285, ack 2030, win 70, length 64
09:47:48.844600 IP (tos 0x0, ttl 43, id 52740, offset 0, flags [DF], proto TCP (6), length 40)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [.], cksum 0xe14f (correct), seq 4285, ack 3975, win 76, length 0
09:47:48.844633 IP (tos 0x0, ttl 43, id 52741, offset 0, flags [DF], proto TCP (6), length 40)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [.], cksum 0xe132 (correct), seq 4285, ack 4004, win 76, length 0
09:47:48.844636 IP (tos 0x0, ttl 43, id 52742, offset 0, flags [DF], proto TCP (6), length 88)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [P.], cksum 0xe7b7 (correct), seq 4285:4333, ack 4004, win 76, length 48
09:47:48.850612 IP (tos 0x0, ttl 43, id 52743, offset 0, flags [DF], proto TCP (6), length 518)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [P.], cksum 0x9d28 (correct), seq 4333:4811, ack 4004, win 76, length 478
09:47:48.860475 IP (tos 0x0, ttl 43, id 5869, offset 0, flags [DF], proto TCP (6), length 1125)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [P.], cksum 0xd9ad (correct), seq 3762:4847, ack 2954, win 76, length 1085
09:47:48.950267 IP (tos 0x0, ttl 43, id 5870, offset 0, flags [DF], proto TCP (6), length 40)
    lb-140-82-112-5-iad.github.com.443 > 192.168.100.2.53394: Flags [.], cksum 0x4568 (correct), seq 4847, ack 2985, win 76, length 0
09:47:48.960491 IP (tos 0x0, ttl 43, id 52744, offset 0, flags [DF], proto TCP (6), length 40)
    lb-140-82-112-22-iad.github.com.443 > 192.168.100.2.53395: Flags [.], cksum 0xdf05 (correct), seq 4811, ack 4035, win 76, length 0
09:47:50.613274 IP (tos 0x0, ttl 64, id 21635, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.100.1 > 192.168.100.2: ICMP echo request, id 1, seq 0, length 64
09:47:50.613989 IP (tos 0x0, ttl 64, id 21636, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.100.1 > 192.168.100.2: ICMP echo request, id 1, seq 256, length 64
09:47:50.936275 IP (tos 0x0, ttl 46, id 17531, offset 0, flags [DF], proto TCP (6), length 64)
    ec2-34-233-138-108.compute-1.amazonaws.com.443 > 192.168.100.2.53302: Flags [P.], cksum 0x559e (correct), seq 3191314682:3191314706, ack 4228239297, win 562, length 24
09:47:51.011236 IP (tos 0x0, ttl 46, id 17532, offset 0, flags [DF], proto TCP (6), length 40)
    ec2-34-233-138-108.compute-1.amazonaws.com.443 > 192.168.100.2.53302: Flags [.], cksum 0xe682 (correct), seq 24, ack 29, win 562, length 0
09:47:51.212423 IP (tos 0x0, ttl 235, id 40554, offset 0, flags [DF], proto TCP (6), length 84)
    ec2-34-214-147-171.us-west-2.compute.amazonaws.com.443 > 192.168.100.2.64281: Flags [P.], cksum 0x3e6c (correct), seq 3581159182:3581159214, ack 3480603771, win 849, options [nop,nop,TS val 2534756067 ecr 2260863016], length 32

Maybe use:

for wan (replace pppoe-wan with your real wan interface)
this is for the wan interface and will only show DSCPs for packets leaving the network (ingress DSCPs are only set after this vantage point deeper inside your home network IITC.)

# IPv4/6 everything not DSCP BE/CS0, 
tcpdump -i pppoe-wan -v -n '(ip and (ip[1] & 0xfc) >> 2 != 0)' or '(ip6 and (ip6[0:2] & 0xfc0) >> 4  != 0)'

and (replace br-lan with your real lan interface/bridge)
this will only help for DSCPs for incoming packets...

# IPv4/6 everything not DSCP BE/CS0
tcpdump -i br-lan -v -n '(ip and (ip[1] & 0xfc) >> 2 != 0)' or '(ip6 and (ip6[0:2] & 0xfc0) >> 4  != 0)'

to only see the non-0 DSCPs? You still need to a find a way to confirm that the right packets are marked according to your rules...

login as: root


BusyBox v1.36.1 (2024-03-22 22:09:42 UTC) built-in shell (ash)

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 OpenWrt 23.05.3, r23809-234f1a2efa
 -----------------------------------------------------
=== WARNING! =====================================
There is no root password defined on this device!
Use the "passwd" command to set up a new password
in order to prevent unauthorized SSH logins.
--------------------------------------------------
root@OpenWrt:~# tcpdump -i wan -v -n '(ip and (ip[1] & 0xfc) >> 2 != 0)' or '(ip
6 and (ip6[0:2] & 0xfc0) >> 4  != 0)'
tcpdump: listening on wan, link-type EN10MB (Ethernet), snapshot length 262144 b                                                                                        ytes
10:44:05.161585 IP (tos 0xe0, ttl 4, id 42050, offset 0, flags [DF], proto UDP (                                                                                        17), length 160)
    192.168.100.1.40912 > 239.255.255.250.1900: UDP, length 132
10:44:05.421375 IP (tos 0xe0, ttl 4, id 42052, offset 0, flags [DF], proto UDP (                                                                                        17), length 160)
    192.168.100.1.40912 > 239.255.255.250.1900: UDP, length 132
10:44:05.570822 IP (tos 0x28, ttl 39, id 11538, offset 0, flags [DF], proto TCP                                                                                         (6), length 64)
    52.5.112.135.443 > 192.168.100.2.49574: Flags [P.], cksum 0x47ad (correct),                                                                                         seq 2207357481:2207357505, ack 3877007013, win 579, length 24
10:44:05.645919 IP (tos 0x28, ttl 39, id 11539, offset 0, flags [DF], proto TCP                                                                                         (6), length 40)
    52.5.112.135.443 > 192.168.100.2.49574: Flags [.], cksum 0xad4d (correct), a                                                                                        ck 29, win 579, length 0
10:44:05.681437 IP (tos 0xe0, ttl 4, id 42069, offset 0, flags [DF], proto UDP (                                                                                        17), length 161)
    192.168.100.1.40912 > 239.255.255.250.1900: UDP, length 133
10:44:05.941203 IP (tos 0xe0, ttl 4, id 42085, offset 0, flags [DF], proto UDP (                                                                                        17), length 161)
    192.168.100.1.40912 > 239.255.255.250.1900: UDP, length 133
10:44:07.454831 IP (tos 0x48, ttl 113, id 61638, offset 0, flags [none], proto T                                                                                        CP (6), length 52)
    172.217.204.188.5228 > 192.168.100.2.65508: Flags [.], cksum 0x7315 (correct                                                                                        ), ack 441645586, win 290, options [nop,nop,sack 1 {0:1}], length 0
10:44:09.373397 IP (tos 0x28, ttl 231, id 44160, offset 0, flags [DF], proto TCP (6), length 84)
    44.228.43.185.443 > 192.168.100.2.65060: Flags [P.], cksum 0xd0d0 (correct), seq 1198969707:1198969739, ack 3493242810, win 849, options [nop,nop,TS val 3868859015 ecr 3663451497], length 32
10:44:15.570676 IP (tos 0x28, ttl 39, id 11540, offset 0, flags [DF], proto TCP (6), length 64)
    52.5.112.135.443 > 192.168.100.2.49574: Flags [P.], cksum 0x2d40 (correct), seq 24:48, ack 29, win 579, length 24
10:44:15.647808 IP (tos 0x28, ttl 39, id 11541, offset 0, flags [DF], proto TCP (6), length 40)
    52.5.112.135.443 > 192.168.100.2.49574: Flags [.], cksum 0xad19 (correct), ack 57, win 579, length 0
10:44:16.159051 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 1278)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 1250
10:44:16.159051 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 1278)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 1250
10:44:16.171076 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 1278)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 1250
10:44:16.171296 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 331)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 303
10:44:16.171296 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 975)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 947
10:44:16.171296 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 88)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 60
10:44:16.188530 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 52)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 24
10:44:16.220779 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 148)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 120
10:44:16.223781 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 57)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 29
10:44:16.223781 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 53)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 25
10:44:16.249289 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 374)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 346
10:44:16.249289 IP (tos 0x48, ttl 54, id 0, offset 0, flags [DF], proto UDP (17), length 199)
    142.250.217.202.443 > 192.168.100.2.60308: UDP, length 171

BusyBox v1.36.1 (2024-03-22 22:09:42 UTC) built-in shell (ash)

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 OpenWrt 23.05.3, r23809-234f1a2efa
 -----------------------------------------------------
=== WARNING! =====================================
There is no root password defined on this device!
Use the "passwd" command to set up a new password
in order to prevent unauthorized SSH logins.
--------------------------------------------------
root@OpenWrt:~# tcpdump -i br-lan -v -n '(ip and (ip[1] & 0xfc) >> 2 != 0)' or '
(ip6 and (ip6[0:2] & 0xfc0) >> 4  != 0)'
tcpdump: listening on br-lan, link-type EN10MB (Ethernet), snapshot length 262144 bytes
10:47:52.606108 IP (tos 0x48, ttl 64, id 41150, offset 0, flags [DF], proto TCP (6), length 152)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8441 (incorrect -> 0xe0c5), seq 189849081:189849193, ack 3611683379, win 1002, length 112
10:47:52.606238 IP (tos 0x48, ttl 64, id 41151, offset 0, flags [DF], proto TCP (6), length 136)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8431 (incorrect -> 0x6a94), seq 112:208, ack 1, win 1002, length 96
10:47:52.675607 IP (tos 0x48, ttl 64, id 41152, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x53be), seq 208:368, ack 1, win 1002, length 160
10:47:52.675787 IP (tos 0x48, ttl 64, id 41153, offset 0, flags [DF], proto TCP (6), length 248)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x84a1 (incorrect -> 0xc9b2), seq 368:576, ack 1, win 1002, length 208
10:47:52.675966 IP (tos 0x48, ttl 64, id 41154, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x46ed), seq 576:736, ack 1, win 1002, length 160
10:47:52.676093 IP (tos 0x48, ttl 64, id 41155, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x82e2), seq 736:928, ack 1, win 1002, length 192
10:47:52.785543 IP (tos 0x48, ttl 64, id 41156, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xae13), seq 928:1088, ack 1, win 1002, length 160
10:47:52.785679 IP (tos 0x48, ttl 64, id 41157, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x7b1b), seq 1088:1280, ack 1, win 1002, length 192
10:47:52.785840 IP (tos 0x48, ttl 64, id 41158, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xb515), seq 1280:1440, ack 1, win 1002, length 160
10:47:52.785962 IP (tos 0x48, ttl 64, id 41159, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x1a2f), seq 1440:1632, ack 1, win 1002, length 192
10:47:52.786117 IP (tos 0x48, ttl 64, id 41160, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x481a), seq 1632:1792, ack 1, win 1002, length 160
10:47:52.786239 IP (tos 0x48, ttl 64, id 41161, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x2e40), seq 1792:1984, ack 1, win 1002, length 192
10:47:52.786391 IP (tos 0x48, ttl 64, id 41162, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xcecd), seq 1984:2144, ack 1, win 1002, length 160
10:47:52.786513 IP (tos 0x48, ttl 64, id 41163, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x0ad7), seq 2144:2336, ack 1, win 1002, length 192
10:47:52.895535 IP (tos 0x48, ttl 64, id 41164, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x4cfc), seq 2336:2496, ack 1, win 1002, length 160
10:47:52.895665 IP (tos 0x48, ttl 64, id 41165, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x3169), seq 2496:2688, ack 1, win 1002, length 192
10:47:52.895821 IP (tos 0x48, ttl 64, id 41166, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xe308), seq 2688:2848, ack 1, win 1002, length 160
10:47:52.895943 IP (tos 0x48, ttl 64, id 41167, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x38a9), seq 2848:3040, ack 1, win 1002, length 192
10:47:52.896097 IP (tos 0x48, ttl 64, id 41168, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x2577), seq 3040:3200, ack 1, win 1002, length 160
10:47:52.896220 IP (tos 0x48, ttl 64, id 41169, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xbd21), seq 3200:3392, ack 1, win 1002, length 192
10:47:52.896371 IP (tos 0x48, ttl 64, id 41170, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x6c84), seq 3392:3552, ack 1, win 1002, length 160
10:47:52.896493 IP (tos 0x48, ttl 64, id 41171, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x2b23), seq 3552:3744, ack 1, win 1002, length 192
10:47:52.896644 IP (tos 0x48, ttl 64, id 41172, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x9957), seq 3744:3904, ack 1, win 1002, length 160
10:47:52.896765 IP (tos 0x48, ttl 64, id 41173, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x6a40), seq 3904:4096, ack 1, win 1002, length 192
10:47:52.896917 IP (tos 0x48, ttl 64, id 41174, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x20dd), seq 4096:4256, ack 1, win 1002, length 160
10:47:52.897039 IP (tos 0x48, ttl 64, id 41175, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x512e), seq 4256:4448, ack 1, win 1002, length 192
10:47:52.897193 IP (tos 0x48, ttl 64, id 41176, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x8fdf), seq 4448:4608, ack 1, win 1002, length 160
10:47:52.897316 IP (tos 0x48, ttl 64, id 41177, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x7e14), seq 4608:4800, ack 1, win 1002, length 192
10:47:52.897468 IP (tos 0x48, ttl 64, id 41178, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x762a), seq 4800:4960, ack 1, win 1002, length 160
10:47:52.897590 IP (tos 0x48, ttl 64, id 41179, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x9a59), seq 4960:5152, ack 1, win 1002, length 192
10:47:53.015534 IP (tos 0x48, ttl 64, id 41180, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x7357), seq 5152:5312, ack 1, win 1002, length 160
10:47:53.015666 IP (tos 0x48, ttl 64, id 41181, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x87cc), seq 5312:5504, ack 1, win 1002, length 192
10:47:53.015822 IP (tos 0x48, ttl 64, id 41182, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xec96), seq 5504:5664, ack 1, win 1002, length 160
10:47:53.015944 IP (tos 0x48, ttl 64, id 41183, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xfdc5), seq 5664:5856, ack 1, win 1002, length 192
10:47:53.016097 IP (tos 0x48, ttl 64, id 41184, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x73fa), seq 5856:6016, ack 1, win 1002, length 160
10:47:53.016219 IP (tos 0x48, ttl 64, id 41185, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x402c), seq 6016:6208, ack 1, win 1002, length 192
10:47:53.016369 IP (tos 0x48, ttl 64, id 41186, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xe3e2), seq 6208:6368, ack 1, win 1002, length 160
10:47:53.016489 IP (tos 0x48, ttl 64, id 41187, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x4364), seq 6368:6560, ack 1, win 1002, length 192
10:47:53.016641 IP (tos 0x48, ttl 64, id 41188, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x1865), seq 6560:6720, ack 1, win 1002, length 160
10:47:53.016763 IP (tos 0x48, ttl 64, id 41189, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x4d96), seq 6720:6912, ack 1, win 1002, length 192
10:47:53.016915 IP (tos 0x48, ttl 64, id 41190, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x3cf4), seq 6912:7072, ack 1, win 1002, length 160
10:47:53.017037 IP (tos 0x48, ttl 64, id 41191, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xc0e4), seq 7072:7264, ack 1, win 1002, length 192
10:47:53.017189 IP (tos 0x48, ttl 64, id 41192, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x3229), seq 7264:7424, ack 1, win 1002, length 160
10:47:53.017310 IP (tos 0x48, ttl 64, id 41193, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x903c), seq 7424:7616, ack 1, win 1002, length 192
10:47:53.017463 IP (tos 0x48, ttl 64, id 41194, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x3a77), seq 7616:7776, ack 1, win 1002, length 160
10:47:53.017583 IP (tos 0x48, ttl 64, id 41195, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xfd7a), seq 7776:7968, ack 1, win 1002, length 192
10:47:53.017736 IP (tos 0x48, ttl 64, id 41196, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x55b1), seq 7968:8128, ack 1, win 1002, length 160
10:47:53.017858 IP (tos 0x48, ttl 64, id 41197, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xbacd), seq 8128:8320, ack 1, win 1002, length 192
10:47:53.018010 IP (tos 0x48, ttl 64, id 41198, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x61e3), seq 8320:8480, ack 1, win 1002, length 160
10:47:53.018136 IP (tos 0x48, ttl 64, id 41199, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xbc43), seq 8480:8672, ack 1, win 1002, length 192
10:47:53.018298 IP (tos 0x48, ttl 64, id 41200, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x7dbe), seq 8672:8832, ack 1, win 1002, length 160
10:47:53.018421 IP (tos 0x48, ttl 64, id 41201, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xc9a2), seq 8832:9024, ack 1, win 1002, length 192
10:47:53.018575 IP (tos 0x48, ttl 64, id 41202, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x0579), seq 9024:9184, ack 1, win 1002, length 160
10:47:53.018696 IP (tos 0x48, ttl 64, id 41203, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x7b91), seq 9184:9376, ack 1, win 1002, length 192
10:47:53.018850 IP (tos 0x48, ttl 64, id 41204, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x0012), seq 9376:9536, ack 1, win 1002, length 160
10:47:53.018971 IP (tos 0x48, ttl 64, id 41205, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xe2ef), seq 9536:9728, ack 1, win 1002, length 192
10:47:53.019132 IP (tos 0x48, ttl 64, id 41206, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xfb78), seq 9728:9888, ack 1, win 1002, length 160
10:47:53.019254 IP (tos 0x48, ttl 64, id 41207, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x4758), seq 9888:10080, ack 1, win 1002, length 192
10:47:53.019405 IP (tos 0x48, ttl 64, id 41208, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xfed8), seq 10080:10240, ack 1, win 1002, length 160
10:47:53.019525 IP (tos 0x48, ttl 64, id 41209, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x4c78), seq 10240:10432, ack 1, win 1002, length 192
10:47:53.019677 IP (tos 0x48, ttl 64, id 41210, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xeda1), seq 10432:10592, ack 1, win 1002, length 160
10:47:53.019801 IP (tos 0x48, ttl 64, id 41211, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x1b73), seq 10592:10784, ack 1, win 1002, length 192
10:47:53.135530 IP (tos 0x48, ttl 64, id 41212, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xf304), seq 10784:10944, ack 1, win 1002, length 160
10:47:53.135659 IP (tos 0x48, ttl 64, id 41213, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x5f1d), seq 10944:11136, ack 1, win 1002, length 192
10:47:53.135816 IP (tos 0x48, ttl 64, id 41214, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x7c7b), seq 11136:11296, ack 1, win 1002, length 160
10:47:53.135939 IP (tos 0x48, ttl 64, id 41215, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x991e), seq 11296:11488, ack 1, win 1002, length 192
10:47:53.136091 IP (tos 0x48, ttl 64, id 41216, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x0e7b), seq 11488:11648, ack 1, win 1002, length 160
10:47:53.136212 IP (tos 0x48, ttl 64, id 41217, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x5764), seq 11648:11840, ack 1, win 1002, length 192
10:47:53.136366 IP (tos 0x48, ttl 64, id 41218, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xa2d0), seq 11840:12000, ack 1, win 1002, length 160
10:47:53.136487 IP (tos 0x48, ttl 64, id 41219, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x306e), seq 12000:12192, ack 1, win 1002, length 192
10:47:53.136639 IP (tos 0x48, ttl 64, id 41220, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xe889), seq 12192:12352, ack 1, win 1002, length 160
10:47:53.136760 IP (tos 0x48, ttl 64, id 41221, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x4fc0), seq 12352:12544, ack 1, win 1002, length 192
10:47:53.136919 IP (tos 0x48, ttl 64, id 41222, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xba93), seq 12544:12704, ack 1, win 1002, length 160
10:47:53.137043 IP (tos 0x48, ttl 64, id 41223, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xe18e), seq 12704:12896, ack 1, win 1002, length 192
10:47:53.137198 IP (tos 0x48, ttl 64, id 41224, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x59ff), seq 12896:13056, ack 1, win 1002, length 160
10:47:53.137321 IP (tos 0x48, ttl 64, id 41225, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x4bd0), seq 13056:13248, ack 1, win 1002, length 192
10:47:53.137473 IP (tos 0x48, ttl 64, id 41226, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xed26), seq 13248:13408, ack 1, win 1002, length 160
10:47:53.137602 IP (tos 0x48, ttl 64, id 41227, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xb2dc), seq 13408:13600, ack 1, win 1002, length 192
10:47:53.137759 IP (tos 0x48, ttl 64, id 41228, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0xf516), seq 13600:13760, ack 1, win 1002, length 160
10:47:53.137879 IP (tos 0x48, ttl 64, id 41229, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xce8e), seq 13760:13952, ack 1, win 1002, length 192
10:47:53.138033 IP (tos 0x48, ttl 64, id 41230, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x04e4), seq 13952:14112, ack 1, win 1002, length 160
10:47:53.138155 IP (tos 0x48, ttl 64, id 41231, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0x069e), seq 14112:14304, ack 1, win 1002, length 192
10:47:53.138308 IP (tos 0x48, ttl 64, id 41232, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x2ec9), seq 14304:14464, ack 1, win 1002, length 160
10:47:53.138431 IP (tos 0x48, ttl 64, id 41233, offset 0, flags [DF], proto TCP (6), length 232)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8491 (incorrect -> 0xcde6), seq 14464:14656, ack 1, win 1002, length 192
10:47:53.138593 IP (tos 0x48, ttl 64, id 41234, offset 0, flags [DF], proto TCP (6), length 200)
    192.168.1.1.22 > 192.168.1.101.49673: Flags [P.], cksum 0x8471 (incorrect -> 0x89fc), seq 14656:14816, ack 1, win 1002, length 160
10:47:53.138715 IP (tos 0x48, ttl 64, id 41235, offset 0, flags [DF], proto TCP (6), length 232)

If you look here for reference you can decode the hexadecimal TOS values to DSCPs:

**tos** hex 0xe0; dec 224; **DSCP** hex 0x38; dec 56; symbolic cs7
**tos** hex 0x48; dec 72;  **DSCP** hex 0x12; dec 18; symbolic af21
**tos** hex 0x28; dec 40;  **DSCP** hex 0x0a; dec 10; symbolic af11

but only you know whether you actually assigned those to anything.

For easier debugging, I would start with a single marking rule and conform its operation before adding the next rule. Also I would try to get away with as little rules as possible and , even more important than the number of rules, I would try to only up-prioritise as few packets as I absolutely need to. Trying to up-prioritise everything has the same effect as not prioritising at all, and for every packet that gets treated to lower delay some other packet(s) will need to be treated to longer delay or even a drop, so make sure you have enough 'victim' packets art hand.

1 Like

thanks much will do some testing throughout the day

i set these rules only to test it

tcp . 53 : goto dscp_set_voice,  # DNS
udp . 53 : goto dscp_set_voice,  # DNS

then i ran tcdump on port 53

tcpdump udp port 53 -i wan -v -n

but it doesnt look like its marking the packets when i decode it can you see if its working port 53 is supposed to decode to cs4

login as: root


BusyBox v1.36.1 (2024-03-22 22:09:42 UTC) built-in shell (ash)

  _______                     ________        __
 |       |.-----.-----.-----.|  |  |  |.----.|  |_
 |   -   ||  _  |  -__|     ||  |  |  ||   _||   _|
 |_______||   __|_____|__|__||________||__|  |____|
          |__| W I R E L E S S   F R E E D O M
 -----------------------------------------------------
 OpenWrt 23.05.3, r23809-234f1a2efa
 -----------------------------------------------------
=== WARNING! =====================================
There is no root password defined on this device!
Use the "passwd" command to set up a new password
in order to prevent unauthorized SSH logins.
--------------------------------------------------
root@OpenWrt:~# tcpdump udp port 53 -i wan -v -n
tcpdump: listening on wan, link-type EN10MB (Ethernet), snapshot length 262144 b                                                                                        ytes
12:54:15.329179 IP (tos 0x0, ttl 64, id 35220, offset 0, flags [DF], proto UDP (                                                                                        17), length 60)
    192.168.100.2.60766 > 192.168.100.1.53: 63136+ A? www.google.com. (32)
12:54:15.329600 IP (tos 0x0, ttl 64, id 35221, offset 0, flags [DF], proto UDP (                                                                                        17), length 60)
    192.168.100.2.56641 > 192.168.100.1.53: 24172+ HTTPS? www.google.com. (32)
12:54:15.335508 IP (tos 0x0, ttl 64, id 38459, offset 0, flags [DF], proto UDP (                                                                                        17), length 76)
    192.168.100.1.53 > 192.168.100.2.60766: 63136 1/0/0 www.google.com. A 142.25                                                                                        0.217.164 (48)
12:54:15.337005 IP (tos 0x0, ttl 64, id 38460, offset 0, flags [DF], proto UDP (                                                                                        17), length 85)
    192.168.100.1.53 > 192.168.100.2.56641: 24172 1/0/0 www.google.com. HTTPS (5                                                                                        7)
12:54:19.342061 IP (tos 0x0, ttl 64, id 35373, offset 0, flags [DF], proto UDP (17), length 63)
    192.168.100.2.35305 > 192.168.100.1.53: 34010+ A? ttmarprt1.GHL.INT. (35)
12:54:19.342996 IP (tos 0x0, ttl 64, id 38558, offset 0, flags [DF], proto UDP (17), length 63)
    192.168.100.1.53 > 192.168.100.2.35305: 34010 NXDomain 0/0/0 (35)
12:54:20.536083 IP (tos 0x0, ttl 64, id 35487, offset 0, flags [DF], proto UDP (17), length 75)
    192.168.100.2.53995 > 192.168.100.1.53: 9977+ SRV? _ldap._tcp.pdc._msdcs.GHL.INT. (47)
12:54:20.536945 IP (tos 0x0, ttl 64, id 38595, offset 0, flags [DF], proto UDP (17), length 75)
    192.168.100.1.53 > 192.168.100.2.53995: 9977 NXDomain 0/0/0 (47)
12:54:21.575983 IP (tos 0x0, ttl 64, id 35517, offset 0, flags [DF], proto UDP (17), length 75)
    192.168.100.2.38445 > 192.168.100.1.53: 40029+ SRV? _ldap._tcp.pdc._msdcs.GHL.INT. (47)
12:54:21.576860 IP (tos 0x0, ttl 64, id 38632, offset 0, flags [DF], proto UDP (17), length 75)
    192.168.100.1.53 > 192.168.100.2.38445: 40029 NXDomain 0/0/0 (47)
12:54:25.369835 IP (tos 0x0, ttl 64, id 35664, offset 0, flags [DF], proto UDP (17), length 93)
    192.168.100.2.56672 > 192.168.100.1.53: 46146+ SRV? _ldap._tcp.CWB_Curacao._sites.dc._msdcs.GHL.INT. (65)
12:54:25.370812 IP (tos 0x0, ttl 64, id 38823, offset 0, flags [DF], proto UDP (17), length 93)
    192.168.100.1.53 > 192.168.100.2.56672: 46146 NXDomain 0/0/0 (65)
12:54:25.373348 IP (tos 0x0, ttl 64, id 35665, offset 0, flags [DF], proto UDP (17), length 74)
    192.168.100.2.48487 > 192.168.100.1.53: 22776+ SRV? _ldap._tcp.dc._msdcs.GHL.INT. (46)
12:54:25.374042 IP (tos 0x0, ttl 64, id 38824, offset 0, flags [DF], proto UDP (17), length 74)
    192.168.100.1.53 > 192.168.100.2.48487: 22776 NXDomain 0/0/0 (46)
12:54:25.376782 IP (tos 0x0, ttl 64, id 35666, offset 0, flags [DF], proto UDP (17), length 116)
    192.168.100.2.47025 > 192.168.100.1.53: 58502+ SRV? _ldap._tcp.c5ba2a5e-1da7-4adf-bd3f-1f326e19a6a0.domains._msdcs.GHL.INT. (88)
12:54:25.377716 IP (tos 0x0, ttl 64, id 38825, offset 0, flags [DF], proto UDP (17), length 116)
    192.168.100.1.53 > 192.168.100.2.47025: 58502 NXDomain 0/0/0 (88)
12:54:26.244414 IP (tos 0x0, ttl 64, id 35679, offset 0, flags [DF], proto UDP (17), length 71)
    192.168.100.2.48883 > 192.168.100.1.53: 48255+ A? guc3-spclient.spotify.com. (43)
12:54:26.245421 IP (tos 0x0, ttl 64, id 35680, offset 0, flags [DF], proto UDP (17), length 71)
    192.168.100.2.38087 > 192.168.100.1.53: 63060+ HTTPS? guc3-spclient.spotify.com. (43)
12:54:26.251198 IP (tos 0x0, ttl 64, id 38890, offset 0, flags [DF], proto UDP (17), length 136)
    192.168.100.1.53 > 192.168.100.2.48883: 48255 2/0/0 guc3-spclient.spotify.com. CNAME edge-web-guc3.dual-gslb.spotify.com., edge-web-guc3.dual-gslb.spotify.com. A 35.186.224.31 (108)
12:54:26.251974 IP (tos 0x0, ttl 64, id 38891, offset 0, flags [DF], proto UDP (17), length 194)
    192.168.100.1.53 > 192.168.100.2.38087: 63060 1/1/0 guc3-spclient.spotify.com. CNAME edge-web-guc3.dual-gslb.spotify.com. (166)

not even sure if the rules are being applied at all
i made this rule for call of duty

udp . 3074 : goto dscp_set_voice,  # COD

but its not being tagged with cs4

14:41:11.015650 IP (tos 0x48, ttl 46, id 63022, offset 0, flags [DF], proto UDP (17), length 245)
    45.63.72.241.43460 > 192.168.100.2.3074: UDP, length 217
**tos** hex 0x48; dec 72;  **DSCP** hex 0x12; dec 18; symbolic af21

Download packets are tagged on the IFB interface. So looking at them on the wan interface looks at the pre-tagged state. So maybe try tcpdump on the ifb-wan interface? I think tc acts before the point tcpdump looks, so looking on the IFB interface should work.

Also look at the output from:

service cake-qos-simple download

You should see lots of hits under β€˜voice’.

But should the egress markings not be visible there?

1 Like

this is my rules

        udp . 3074 : goto dscp_set_voice,  # COD
        udp . 53 : goto dscp_set_video,  # DNS
        tcp . 1935 : goto dscp_set_video, # STREAMING
        tcp . 443 : goto dscp_set_besteffort, # BROWSING
        tcp . 80 : goto dscp_set_besteffort  # BROWSING

output of tcdump ifb-wan

root@OpenWrt:~# tcpdump host 192.168.100.2 -i ifb-wan -v -n
tcpdump: listening on ifb-wan, link-type EN10MB (Ethernet), snapshot length 262144 bytes
15:23:16.134886 IP (tos 0x0, ttl 46, id 10154, offset 0, flags [DF], proto TCP (6), length 64)
    34.233.138.108.443 > 192.168.100.2.57185: Flags [P.], cksum 0x9ee8 (correct), seq 2950434900:2950434924, ack 2475246557, win 579, length 24
15:23:16.211991 IP (tos 0x0, ttl 46, id 10155, offset 0, flags [DF], proto TCP (6), length 40)
    34.233.138.108.443 > 192.168.100.2.57185: Flags [.], cksum 0x62a9 (correct), ack 29, win 579, length 0
15:23:17.654375 IP (tos 0x40, ttl 117, id 11401, offset 0, flags [none], proto UDP (17), length 254)
    8.8.4.4.53 > 192.168.100.2.64268: 31776 5/0/0 ps5.np.playstation.net. CNAME ps5.np.playstation.net.edgekey88.net., ps5.np.playstation.net.edgekey88.net. CNAME ps5.np.playstation.net.edgekey.net.globalredir.akadns88.net., ps5.np.playstation.net.edgekey.net.globalredir.akadns88.net. CNAME e40436.api8.akamaiedge.net., e40436.api8.akamaiedge.net. A 104.75.171.16, e40436.api8.akamaiedge.net. A 104.75.171.9 (226)
15:23:17.758461 IP (tos 0x0, ttl 50, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [S.], cksum 0x52c4 (correct), seq 1928022880, ack 1685190391, win 65160, options [mss 1412,sackOK,TS val 3831186444 ecr 2000632864,nop,wscale 7], length 0
15:23:17.862469 IP (tos 0x0, ttl 50, id 15433, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x7c86 (correct), ack 152, win 508, options [nop,nop,TS val 3831186548 ecr 2000632968], length 0
15:23:17.862607 IP (tos 0x0, ttl 50, id 15434, offset 0, flags [DF], proto TCP (6), length 1452)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x3da5 (incorrect -> 0xeb7d), seq 1:1401, ack 152, win 508, options [nop,nop,TS val 3831186548 ecr 2000632968], length 1400
15:23:17.863180 IP (tos 0x0, ttl 50, id 15435, offset 0, flags [DF], proto TCP (6), length 771)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [P.], cksum 0x3afc (incorrect -> 0x762d), seq 1401:2120, ack 152, win 508, options [nop,nop,TS val 3831186548 ecr 2000632968], length 719
15:23:17.970142 IP (tos 0x0, ttl 50, id 15436, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x72e9 (correct), ack 278, win 508, options [nop,nop,TS val 3831186656 ecr 2000633076], length 0
15:23:17.970531 IP (tos 0x0, ttl 50, id 15437, offset 0, flags [DF], proto TCP (6), length 103)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [P.], cksum 0x362c (correct), seq 2120:2171, ack 278, win 508, options [nop,nop,TS val 3831186656 ecr 2000633076], length 51
15:23:18.074008 IP (tos 0x0, ttl 50, id 15438, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x70be (correct), ack 576, win 506, options [nop,nop,TS val 3831186760 ecr 2000633180], length 0
15:23:18.074309 IP (tos 0x0, ttl 50, id 15439, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x6b4b (correct), ack 1976, win 501, options [nop,nop,TS val 3831186760 ecr 2000633180], length 0
15:23:18.075117 IP (tos 0x0, ttl 50, id 15440, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x68a9 (correct), ack 2653, win 497, options [nop,nop,TS val 3831186761 ecr 2000633180], length 0
15:23:18.075144 IP (tos 0x0, ttl 50, id 15441, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x6858 (correct), ack 2734, win 497, options [nop,nop,TS val 3831186761 ecr 2000633180], length 0
15:23:18.297976 IP (tos 0x0, ttl 50, id 15442, offset 0, flags [DF], proto TCP (6), length 859)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [P.], cksum 0x27c2 (correct), seq 2171:2978, ack 2734, win 501, options [nop,nop,TS val 3831186984 ecr 2000633180], length 807
15:23:18.298842 IP (tos 0x0, ttl 50, id 15443, offset 0, flags [DF], proto TCP (6), length 83)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [P.], cksum 0xe382 (correct), seq 2978:3009, ack 2734, win 501, options [nop,nop,TS val 3831186985 ecr 2000633180], length 31
15:23:18.299242 IP (tos 0x0, ttl 50, id 15444, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [F.], cksum 0x642d (correct), seq 3009, ack 2734, win 501, options [nop,nop,TS val 3831186985 ecr 2000633180], length 0
15:23:18.402158 IP (tos 0x0, ttl 50, id 15445, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x627e (correct), ack 2734, win 501, options [nop,nop,TS val 3831187088 ecr 2000633508], length 0
15:23:18.402409 IP (tos 0x0, ttl 50, id 15446, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x627e (correct), ack 2734, win 501, options [nop,nop,TS val 3831187088 ecr 2000633508], length 0
15:23:18.402656 IP (tos 0x0, ttl 50, id 15447, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x627e (correct), ack 2734, win 501, options [nop,nop,TS val 3831187088 ecr 2000633508], length 0
15:23:18.424257 IP (tos 0x0, ttl 234, id 41331, offset 0, flags [DF], proto TCP (6), length 52)
    34.208.156.131.443 > 192.168.100.2.50694: Flags [F.], cksum 0xfd7b (correct), seq 1103597276, ack 1488776487, win 306, options [nop,nop,TS val 2039359107 ecr 1329841777], length 0
15:23:18.424288 IP (tos 0x0, ttl 234, id 41332, offset 0, flags [DF], proto TCP (6), length 52)
    34.208.156.131.443 > 192.168.100.2.50694: Flags [.], cksum 0xfd7a (correct), ack 2, win 306, options [nop,nop,TS val 2039359107 ecr 1329841777], length 0
15:23:18.721573 IP (tos 0x0, ttl 50, id 15448, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x5fff (correct), ack 2734, win 501, options [nop,nop,TS val 3831187407 ecr 2000633828], length 0
15:23:19.161755 IP (tos 0x0, ttl 50, id 15449, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x5c8f (correct), ack 2734, win 501, options [nop,nop,TS val 3831187847 ecr 2000634268], length 0
15:23:19.438176 IP (tos 0x0, ttl 116, id 33953, offset 0, flags [none], proto TCP (6), length 52)
    34.110.208.105.443 > 192.168.100.2.60881: Flags [.], cksum 0x88de (correct), ack 707398164, win 489, options [nop,nop,TS val 2208469716 ecr 3791246988], length 0
15:23:19.438387 IP (tos 0x0, ttl 116, id 33954, offset 0, flags [none], proto TCP (6), length 52)
    34.110.208.105.443 > 192.168.100.2.60881: Flags [.], cksum 0x853e (correct), ack 929, win 489, options [nop,nop,TS val 2208469716 ecr 3791246988], length 0
15:23:19.499914 IP (tos 0x0, ttl 116, id 33955, offset 0, flags [none], proto TCP (6), length 222)
    34.110.208.105.443 > 192.168.100.2.60881: Flags [P.], cksum 0x7d0f (correct), seq 0:170, ack 929, win 489, options [nop,nop,TS val 2208469778 ecr 3791246988], length 170
15:23:19.546009 IP (tos 0x0, ttl 116, id 33956, offset 0, flags [none], proto TCP (6), length 52)
    34.110.208.105.443 > 192.168.100.2.60881: Flags [.], cksum 0x8249 (correct), ack 1300, win 489, options [nop,nop,TS val 2208469824 ecr 3791247096], length 0
15:23:19.546218 IP (tos 0x0, ttl 116, id 33957, offset 0, flags [none], proto TCP (6), length 52)
    34.110.208.105.443 > 192.168.100.2.60881: Flags [.], cksum 0x7cd1 (correct), ack 2700, win 489, options [nop,nop,TS val 2208469824 ecr 3791247096], length 0
15:23:19.546793 IP (tos 0x0, ttl 116, id 33958, offset 0, flags [none], proto TCP (6), length 52)
    34.110.208.105.443 > 192.168.100.2.60881: Flags [.], cksum 0x7be3 (correct), ack 2938, win 489, options [nop,nop,TS val 2208469824 ecr 3791247096], length 0
15:23:19.608711 IP (tos 0x0, ttl 116, id 33959, offset 0, flags [none], proto TCP (6), length 222)
    34.110.208.105.443 > 192.168.100.2.60881: Flags [P.], cksum 0x6ff8 (correct), seq 170:340, ack 2938, win 489, options [nop,nop,TS val 2208469886 ecr 3791247096], length 170
15:23:19.654730 IP (tos 0x0, ttl 116, id 33960, offset 0, flags [none], proto TCP (6), length 52)
    34.110.208.105.443 > 192.168.100.2.60881: Flags [.], cksum 0x78e9 (correct), ack 3314, win 489, options [nop,nop,TS val 2208469932 ecr 3791247204], length 0
15:23:19.654870 IP (tos 0x0, ttl 116, id 33961, offset 0, flags [none], proto TCP (6), length 52)
    34.110.208.105.443 > 192.168.100.2.60881: Flags [.], cksum 0x76c0 (correct), ack 3866, win 489, options [nop,nop,TS val 2208469933 ecr 3791247204], length 0
15:23:19.720770 IP (tos 0x0, ttl 116, id 33962, offset 0, flags [none], proto TCP (6), length 222)
    34.110.208.105.443 > 192.168.100.2.60881: Flags [P.], cksum 0xbb8f (correct), seq 340:510, ack 3866, win 489, options [nop,nop,TS val 2208469998 ecr 3791247204], length 170
15:23:19.841760 IP (tos 0x0, ttl 50, id 15450, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x573f (correct), ack 2734, win 501, options [nop,nop,TS val 3831188527 ecr 2000634948], length 0
15:23:20.330562 IP (tos 0x0, ttl 64, id 64560, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.100.1 > 192.168.100.2: ICMP echo request, id 1, seq 0, length 64
15:23:20.331348 IP (tos 0x0, ttl 64, id 64561, offset 0, flags [DF], proto ICMP (1), length 84)
    192.168.100.1 > 192.168.100.2: ICMP echo request, id 1, seq 256, length 64
15:23:20.346453 IP (tos 0x40, ttl 117, id 16503, offset 0, flags [none], proto UDP (17), length 192)
    8.8.4.4.53 > 192.168.100.2.49436: 41025 4/0/0 alb001-pushcl.np.communication.playstation.net. CNAME alb001-push-cc2s01.push.usw2.np.cn.s0.playstation.net., alb001-push-cc2s01.push.usw2.np.cn.s0.playstation.net. A 54.71.247.172, alb001-push-cc2s01.push.usw2.np.cn.s0.playstation.net. A 44.240.143.251, alb001-push-cc2s01.push.usw2.np.cn.s0.playstation.net. A 54.200.43.231 (164)
15:23:20.471565 IP (tos 0x0, ttl 234, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [S.], cksum 0x9187 (correct), seq 3201758514, ack 3970215419, win 26847, options [mss 1412,sackOK,TS val 3666216342 ecr 2484029925,nop,wscale 8], length 0
15:23:20.596938 IP (tos 0x0, ttl 234, id 22730, offset 0, flags [DF], proto TCP (6), length 52)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [.], cksum 0x26ed (correct), ack 176, win 110, options [nop,nop,TS val 3666216467 ecr 2484030050], length 0
15:23:20.596973 IP (tos 0x0, ttl 234, id 22731, offset 0, flags [DF], proto TCP (6), length 1452)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [.], cksum 0xcb3b (correct), seq 1:1401, ack 176, win 110, options [nop,nop,TS val 3666216467 ecr 2484030050], length 1400
15:23:20.597537 IP (tos 0x0, ttl 234, id 22732, offset 0, flags [DF], proto TCP (6), length 1203)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [P.], cksum 0xc6ac (correct), seq 1401:2552, ack 176, win 110, options [nop,nop,TS val 3666216468 ecr 2484030050], length 1151
15:23:20.724785 IP (tos 0x0, ttl 234, id 22733, offset 0, flags [DF], proto TCP (6), length 52)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [.], cksum 0x1b76 (correct), ack 302, win 110, options [nop,nop,TS val 3666216596 ecr 2484030179], length 0
15:23:20.724883 IP (tos 0x0, ttl 234, id 22734, offset 0, flags [DF], proto TCP (6), length 103)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [P.], cksum 0xf546 (correct), seq 2552:2603, ack 302, win 110, options [nop,nop,TS val 3666216596 ecr 2484030179], length 51
15:23:20.850249 IP (tos 0x0, ttl 234, id 22735, offset 0, flags [DF], proto TCP (6), length 52)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [.], cksum 0x11dc (correct), ack 2379, win 190, options [nop,nop,TS val 3666216721 ecr 2484030304], length 0
15:23:20.851060 IP (tos 0x0, ttl 234, id 22736, offset 0, flags [DF], proto TCP (6), length 52)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [.], cksum 0x0b35 (correct), ack 4059, win 212, options [nop,nop,TS val 3666216722 ecr 2484030304], length 0
15:23:20.853729 IP (tos 0x0, ttl 234, id 22737, offset 0, flags [DF], proto TCP (6), length 510)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [P.], cksum 0x3bb3 (correct), seq 2603:3061, ack 4059, win 212, options [nop,nop,TS val 3666216725 ecr 2484030304], length 458
15:23:20.915914 IP (tos 0x40, ttl 116, id 22342, offset 0, flags [none], proto UDP (17), length 115)
    8.8.4.4.53 > 192.168.100.2.50448: 12013 1/0/0 35-160-143-84-pushcl.np.communication.playstation.net. A 35.160.143.84 (87)
15:23:20.978348 IP (tos 0x0, ttl 234, id 22739, offset 0, flags [DF], proto TCP (6), length 52)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [.], cksum 0x084b (correct), ack 4091, win 212, options [nop,nop,TS val 3666216849 ecr 2484030432], length 0
15:23:20.978556 IP (tos 0x0, ttl 234, id 22738, offset 0, flags [DF], proto TCP (6), length 52)
    54.71.247.172.443 > 192.168.100.2.60578: Flags [F.], cksum 0x084c (correct), seq 3061, ack 4090, win 212, options [nop,nop,TS val 3666216849 ecr 2484030432], length 0
15:23:21.001487 IP (tos 0x0, ttl 50, id 15451, offset 0, flags [DF], proto TCP (6), length 52)
    104.75.171.16.443 > 192.168.100.2.51092: Flags [.], cksum 0x4e2f (correct), ack 2734, win 501, options [nop,nop,TS val 3831189687 ecr 2000636108], length 0
15:23:21.043094 IP (tos 0x0, ttl 234, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    35.160.143.84.443 > 192.168.100.2.63390: Flags [S.], cksum 0x52f9 (correct), seq 1906582775, ack 2776069293, win 26847, options [mss 1412,sackOK,TS val 2686922892 ecr 651563780,nop,wscale 7], length 0
15:23:21.170390 IP (tos 0x0, ttl 234, id 60082, offset 0, flags [DF], proto TCP (6), length 52)
    35.160.143.84.443 > 192.168.100.2.63390: Flags [.], cksum 0xe7e5 (correct), ack 183, win 219, options [nop,nop,TS val 2686923019 ecr 651563907], length 0
15:23:21.170921 IP (tos 0x0, ttl 234, id 60083, offset 0, flags [DF], proto TCP (6), length 1452)

cant test the 3074 port right now the playstation network is under maintanence

im not even seeing the rules in luci firewall but i added them to the nft rule file

root@OpenWrt:~# service cake-qos-simple download
qdisc cake 1: root refcnt 2 bandwidth 20Mbit diffserv4 triple-isolate nat nowash ingress no-ack-filter split-gso rtt 100ms noatm overhead 0
 Sent 248398915 bytes 203088 pkt (dropped 5017, overlimits 328434 requeues 0)
 backlog 0b 0p requeues 0
 memory used: 439200b of 4Mb
 capacity estimate: 20Mbit
 min/max network layer size:           46 /    1500
 min/max overhead-adjusted size:       46 /    1500
 average network hdr offset:           14

                   Bulk  Best Effort        Video        Voice
  thresh       1250Kbit       20Mbit       10Mbit        5Mbit
  target         14.5ms          5ms          5ms          5ms
  interval        110ms        100ms        100ms        100ms
  pk_delay          0us        469us        393us        291us
  av_delay          0us        120us         42us         12us
  sp_delay          0us          3us          4us          3us
  backlog            0b           0b           0b           0b
  pkts                0       206634         1238          233
  bytes               0    255481196       224227        31384
  way_inds            0          544            0            0
  way_miss            0         1602         1220            3
  way_cols            0            0            0            0
  drops               0         5017            0            0
  marks               0            0            0            0
  ack_drop            0            0            0            0
  sp_flows            0            2            2            1
  bk_flows            0            1            0            0
  un_flows            0            0            0            0
  max_len             0        16126         1466          175
  quantum           300          610          305          300

So there are some hits there. How about port 3704 with traffic that you expect to generate hits?

Possibly stupid question, did you restart the cake-qos-simple service after making changes?

service cake-qos-simple restart

yes i did restart