IPv6 connection fails

under the tcpdump.

It was as this at first:

root@OpenWrt:~# tcpdump -evni pppoe-wan icmp6
tcpdump: listening on pppoe-wan, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes

Then i type ping6 2606:4700:4700::1111:

root@OpenWrt:~# tcpdump -evni pppoe-wan icmp6
tcpdump: listening on pppoe-wan, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
ping6 2606:4700:4700::1111

but it stays at that point forever

if i press "Ctrl+ C"

root@OpenWrt:~# tcpdump -evni pppoe-wan icmp6
tcpdump: listening on pppoe-wan, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
ping6 2606:4700:4700::1111
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel

Open a new terminal and type the ping command, you cannot run the ping when tcpdump is running.

tcpdump terminal:

root@OpenWrt:~# tcpdump -evni pppoe-wan icmp6
tcpdump: listening on pppoe-wan, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes

second terminal for pinging:

root@OpenWrt:~# ping6 2606:4700:4700::1111
PING 2606:4700:4700::1111 (2606:4700:4700::1111): 56 data bytes

I let them as this and check 2 minutes after but no input on both sides.

ip -6 ad; ip -6 ro list table all; ip -6 ru; ifstatus wan6

root@OpenWrt:~# ip -6 ad; ip -6 ro list table all; ip -6 ru; ifstatus wan6
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 state UNKNOWN qlen 1000
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::8ac3:97ff:fe14:d120/64 scope link
       valid_lft forever preferred_lft forever
73: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::8ac3:97ff:fe85:e087/64 scope link
       valid_lft forever preferred_lft forever
74: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 2a02:ff0:2fc:dc9a::1/64 scope global dynamic noprefixroute
       valid_lft 2567906sec preferred_lft 580706sec
    inet6 fd31:a0b4:50ac::1/60 scope global noprefixroute
       valid_lft forever preferred_lft forever
    inet6 fe80::8ac3:97ff:fe85:e088/64 scope link
       valid_lft forever preferred_lft forever
83: eth0.2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::8ac3:97ff:fe14:d120/64 scope link
       valid_lft forever preferred_lft forever
84: pppoe-wan: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1492 state UNKNOWN qlen 3
    inet6 2a02:ff0:2fc:dc9a:bc52:5ff3:e031:c8c9/64 scope global dynamic noprefixroute
       valid_lft 2591908sec preferred_lft 604708sec
    inet6 fe80::bc52:5ff3:e031:c8c9/128 scope link
       valid_lft forever preferred_lft forever
85: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::8ac3:97ff:fe85:e088/64 scope link
       valid_lft forever preferred_lft forever
default from 2a02:ff0:2fc:dc9a::/64 via fe80::be4a:56ff:fe4f:5080 dev pppoe-wan  metric 512
2a02:ff0:2fc:dc9a::/64 dev br-lan  metric 1024
unreachable 2a02:ff0:2fc:dc9a::/64 dev lo  metric 2147483647
fd31:a0b4:50ac::/64 dev br-lan  metric 1024
unreachable fd31:a0b4:50ac::/48 dev lo  metric 2147483647
fe80::bc52:5ff3:e031:c8c9 dev pppoe-wan  metric 256
fe80::be4a:56ff:fe4f:5080 dev pppoe-wan  metric 1
fe80::/64 dev eth0  metric 256
fe80::/64 dev wlan0  metric 256
fe80::/64 dev br-lan  metric 256
fe80::/64 dev eth0.2  metric 256
fe80::/64 dev wlan1  metric 256
local ::1 dev lo table local  metric 0
anycast 2a02:ff0:2fc:dc9a:: dev br-lan table local  metric 0
anycast 2a02:ff0:2fc:dc9a:: dev pppoe-wan table local  metric 0
local 2a02:ff0:2fc:dc9a::1 dev br-lan table local  metric 0
local 2a02:ff0:2fc:dc9a:bc52:5ff3:e031:c8c9 dev pppoe-wan table local  metric 0
anycast fd31:a0b4:50ac:: dev br-lan table local  metric 0
local fd31:a0b4:50ac::1 dev br-lan table local  metric 0
anycast fe80:: dev eth0 table local  metric 0
anycast fe80:: dev wlan0 table local  metric 0
anycast fe80:: dev br-lan table local  metric 0
anycast fe80:: dev eth0.2 table local  metric 0
anycast fe80:: dev wlan1 table local  metric 0
local fe80::8ac3:97ff:fe14:d120 dev eth0 table local  metric 0
local fe80::8ac3:97ff:fe14:d120 dev eth0.2 table local  metric 0
local fe80::8ac3:97ff:fe85:e087 dev wlan0 table local  metric 0
local fe80::8ac3:97ff:fe85:e088 dev br-lan table local  metric 0
local fe80::8ac3:97ff:fe85:e088 dev wlan1 table local  metric 0
local fe80::bc52:5ff3:e031:c8c9 dev pppoe-wan table local  metric 0
multicast ff00::/8 dev eth0 table local  metric 256
multicast ff00::/8 dev wlan0 table local  metric 256
multicast ff00::/8 dev br-lan table local  metric 256
multicast ff00::/8 dev eth0.2 table local  metric 256
multicast ff00::/8 dev pppoe-wan table local  metric 256
multicast ff00::/8 dev wlan1 table local  metric 256
0:      from all lookup local
32766:  from all lookup main
4200000000:     from 2a02:ff0:2fc:dc9a::1/64 iif br-lan lookup unspec unreachable
4200000001:     from all iif lo lookup unspec 12
4200000074:     from all iif br-lan lookup unspec 12
4200000084:     from all iif pppoe-wan lookup unspec 12
4200000084:     from all iif pppoe-wan lookup unspec 12
{
        "up": true,
        "pending": false,
        "available": true,
        "autostart": true,
        "dynamic": false,
        "uptime": 24094,
        "l3_device": "pppoe-wan",
        "proto": "dhcpv6",
        "device": "pppoe-wan",
        "updated": [
                "prefixes"
        ],
        "metric": 0,
        "dns_metric": 0,
        "delegation": true,
        "ipv4-address": [

        ],
        "ipv6-address": [
                {
                        "address": "2a02:ff0:2fc:dc9a:bc52:5ff3:e031:c8c9",
                        "mask": 64,
                        "preferred": 604707,
                        "valid": 2591907
                }
        ],
        "ipv6-prefix": [
                {
                        "address": "2a02:ff0:2fc:dc9a::",
                        "mask": 64,
                        "preferred": 580705,
                        "valid": 2567905,
                        "class": "wan6",
                        "assigned": {
                                "lan": {
                                        "address": "2a02:ff0:2fc:dc9a::",
                                        "mask": 64
                                }
                        }
                }
        ],
        "ipv6-prefix-assignment": [

        ],
        "route": [
                {
                        "target": "::",
                        "mask": 0,
                        "nexthop": "fe80::be4a:56ff:fe4f:5080",
                        "metric": 512,
                        "valid": 1707,
                        "source": "2a02:ff0:2fc:dc9a::/64"
                },
                {
                        "target": "::",
                        "mask": 0,
                        "nexthop": "fe80::be4a:56ff:fe4f:5080",
                        "metric": 512,
                        "valid": 1707,
                        "source": "2a02:ff0:2fc:dc9a:bc52:5ff3:e031:c8c9/64"
                }
        ],
        "dns-server": [
                "2a02:ff0:2:327:193:192:98:8",
                "2a02:ff0:4:327:212:154:100:18"
        ],
        "dns-search": [

        ],
        "neighbors": [

        ],
        "inactive": {
                "ipv4-address": [

                ],
                "ipv6-address": [

                ],
                "route": [

                ],
                "dns-server": [

                ],
                "dns-search": [

                ],
                "neighbors": [

                ]
        },
        "data": {
                "passthru": "001700202a020ff00002032701930192009800082a020ff0000403270212015401000018"
        }
}

Congratulations to your isp. They are stupid enough to delegate to the lan the same prefix wan has.
IPv6 relay should do the trick.

root@OpenWrt:~# cat /etc/config/dhcp

config dnsmasq
        option domainneeded '1'
        option boguspriv '1'
        option filterwin2k '0'
        option localise_queries '1'
        option rebind_protection '1'
        option rebind_localhost '1'
        option local '/lan/'
        option domain 'lan'
        option expandhosts '1'
        option nonegcache '0'
        option authoritative '1'
        option readethers '1'
        option leasefile '/tmp/dhcp.leases'
        option resolvfile '/tmp/resolv.conf.d/resolv.conf.auto'
        option nonwildcard '1'
        option localservice '1'
        option ednspacket_max '1232'

config dhcp 'lan'
        option interface 'lan'
        option start '100'
        option limit '150'
        option leasetime '12h'
        option dhcpv4 'server'
        option ra 'relay'
        list ra_flags 'none'
        option dhcpv6 'relay'
        option ndp 'relay'

config dhcp 'wan'
        option interface 'wan'
        option ignore '1'
        list ra_flags 'none'

config odhcpd 'odhcpd'
        option maindhcp '0'
        option leasefile '/tmp/hosts/odhcpd'
        option leasetrigger '/usr/sbin/odhcpd-update'
        option loglevel '4'

config dhcp 'wan6'
        option interface 'wan6'
        option master '1'
        option ra 'relay'
        list ra_flags 'none'
        option dhcpv6 'relay'
        option ndp 'relay'

root@OpenWrt:~# ifstatus wan6
{
        "up": true,
        "pending": false,
        "available": true,
        "autostart": true,
        "dynamic": false,
        "uptime": 307,
        "l3_device": "pppoe-wan",
        "proto": "dhcpv6",
        "device": "pppoe-wan",
        "metric": 0,
        "dns_metric": 0,
        "delegation": true,
        "ipv4-address": [

        ],
        "ipv6-address": [
                {
                        "address": "2a02:ff0:2fc:dc9a:c522:9d83:58eb:5f19",
                        "mask": 64,
                        "preferred": 604710,
                        "valid": 2591910
                }
        ],
        "ipv6-prefix": [
                {
                        "address": "2a02:ff0:2fc:dc9a::",
                        "mask": 64,
                        "preferred": 604488,
                        "valid": 2591688,
                        "class": "wan6",
                        "assigned": {
                                "lan": {
                                        "address": "2a02:ff0:2fc:dc9a::",
                                        "mask": 64
                                }
                        }
                }
        ],
        "ipv6-prefix-assignment": [

        ],
        "route": [
                {
                        "target": "::",
                        "mask": 0,
                        "nexthop": "fe80::be4a:56ff:fe4f:5080",
                        "metric": 512,
                        "valid": 1710,
                        "source": "2a02:ff0:2fc:dc9a::/64"
                },
                {
                        "target": "::",
                        "mask": 0,
                        "nexthop": "fe80::be4a:56ff:fe4f:5080",
                        "metric": 512,
                        "valid": 1710,
                        "source": "2a02:ff0:2fc:dc9a:c522:9d83:58eb:5f19/64"
                }
        ],
        "dns-server": [
                "2a02:ff0:2:327:193:192:98:8",
                "2a02:ff0:4:327:212:154:100:18"
        ],
        "dns-search": [

        ],
        "neighbors": [

        ],
        "inactive": {
                "ipv4-address": [

                ],
                "ipv6-address": [

                ],
                "route": [

                ],
                "dns-server": [

                ],
                "dns-search": [

                ],
                "neighbors": [

                ]
        },
        "data": {
                "passthru": "001700202a020ff00002032701930192009800082a020ff0000403270212015401000018"
        }
}
root@OpenWrt:~# ifstatus lan
{
        "up": true,
        "pending": false,
        "available": true,
        "autostart": true,
        "dynamic": false,
        "uptime": 471,
        "l3_device": "br-lan",
        "proto": "static",
        "device": "br-lan",
        "updated": [
                "addresses"
        ],
        "metric": 0,
        "dns_metric": 0,
        "delegation": true,
        "ipv4-address": [
                {
                        "address": "192.168.1.1",
                        "mask": 24
                }
        ],
        "ipv6-address": [

        ],
        "ipv6-prefix": [

        ],
        "ipv6-prefix-assignment": [
                {
                        "address": "2a02:ff0:2fc:dc9a::",
                        "mask": 64,
                        "preferred": 604337,
                        "valid": 2591537,
                        "local-address": {
                                "address": "2a02:ff0:2fc:dc9a::1",
                                "mask": 64
                        }
                },
                {
                        "address": "fd31:a0b4:50ac::",
                        "mask": 60,
                        "local-address": {
                                "address": "fd31:a0b4:50ac::1",
                                "mask": 60
                        }
                }
        ],
        "route": [

        ],
        "dns-server": [
                "1.1.1.1",
                "1.0.0.1"
        ],
        "dns-search": [

        ],
        "neighbors": [

        ],
        "inactive": {
                "ipv4-address": [

                ],
                "ipv6-address": [

                ],
                "route": [

                ],
                "dns-server": [

                ],
                "dns-search": [

                ],
                "neighbors": [

                ]
        },
        "data": {

        }
}
root@OpenWrt:~# ip -6 ad; ip -6 ro list table all; ip -6 ru
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 state UNKNOWN qlen 1000
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::8ac3:97ff:fe14:d120/64 scope link
       valid_lft forever preferred_lft forever
6: br-lan: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 2a02:ff0:2fc:dc9a::1/64 scope global dynamic noprefixroute
       valid_lft 2591491sec preferred_lft 604291sec
    inet6 fd31:a0b4:50ac::1/60 scope global noprefixroute
       valid_lft forever preferred_lft forever
    inet6 fe80::8ac3:97ff:fe85:e088/64 scope link
       valid_lft forever preferred_lft forever
8: eth0.2@eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::8ac3:97ff:fe14:d120/64 scope link
       valid_lft forever preferred_lft forever
9: pppoe-wan: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1492 state UNKNOWN qlen 3
    inet6 2a02:ff0:2fc:dc9a:c522:9d83:58eb:5f19/64 scope global dynamic noprefixroute
       valid_lft 2591890sec preferred_lft 604690sec
    inet6 fe80::c522:9d83:58eb:5f19/128 scope link
       valid_lft forever preferred_lft forever
10: wlan1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::8ac3:97ff:fe85:e088/64 scope link
       valid_lft forever preferred_lft forever
11: wlan0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
    inet6 fe80::8ac3:97ff:fe85:e087/64 scope link
       valid_lft forever preferred_lft forever
default from 2a02:ff0:2fc:dc9a::/64 via fe80::be4a:56ff:fe4f:5080 dev pppoe-wan  metric 512
2a02:ff0:2fc:dc9a:8da2:7145:6835:d867 dev br-lan  metric 1024
2a02:ff0:2fc:dc9a::/64 dev br-lan  metric 256  expires 0sec
2a02:ff0:2fc:dc9a::/64 dev br-lan  metric 1024
unreachable 2a02:ff0:2fc:dc9a::/64 dev lo  metric 2147483647
fd31:a0b4:50ac::/64 dev br-lan  metric 1024
unreachable fd31:a0b4:50ac::/48 dev lo  metric 2147483647
fe80::be4a:56ff:fe4f:5080 dev pppoe-wan  metric 1
fe80::c522:9d83:58eb:5f19 dev pppoe-wan  metric 256
fe80::/64 dev eth0  metric 256
fe80::/64 dev eth0.2  metric 256
fe80::/64 dev br-lan  metric 256
fe80::/64 dev wlan1  metric 256
fe80::/64 dev wlan0  metric 256
local ::1 dev lo table local  metric 0
anycast 2a02:ff0:2fc:dc9a:: dev pppoe-wan table local  metric 0
anycast 2a02:ff0:2fc:dc9a:: dev br-lan table local  metric 0
local 2a02:ff0:2fc:dc9a::1 dev br-lan table local  metric 0
local 2a02:ff0:2fc:dc9a:c522:9d83:58eb:5f19 dev pppoe-wan table local  metric 0
anycast fd31:a0b4:50ac:: dev br-lan table local  metric 0
local fd31:a0b4:50ac::1 dev br-lan table local  metric 0
anycast fe80:: dev eth0 table local  metric 0
anycast fe80:: dev eth0.2 table local  metric 0
anycast fe80:: dev br-lan table local  metric 0
anycast fe80:: dev wlan1 table local  metric 0
anycast fe80:: dev wlan0 table local  metric 0
local fe80::8ac3:97ff:fe14:d120 dev eth0 table local  metric 0
local fe80::8ac3:97ff:fe14:d120 dev eth0.2 table local  metric 0
local fe80::8ac3:97ff:fe85:e087 dev wlan0 table local  metric 0
local fe80::8ac3:97ff:fe85:e088 dev br-lan table local  metric 0
local fe80::8ac3:97ff:fe85:e088 dev wlan1 table local  metric 0
local fe80::c522:9d83:58eb:5f19 dev pppoe-wan table local  metric 0
multicast ff00::/8 dev eth0 table local  metric 256
multicast ff00::/8 dev br-lan table local  metric 256
multicast ff00::/8 dev eth0.2 table local  metric 256
multicast ff00::/8 dev pppoe-wan table local  metric 256
multicast ff00::/8 dev wlan1 table local  metric 256
multicast ff00::/8 dev wlan0 table local  metric 256
0:      from all lookup local
32766:  from all lookup main
4200000000:     from 2a02:ff0:2fc:dc9a::1/64 iif br-lan lookup unspec unreachable
4200000001:     from all iif lo lookup unspec 12
4200000006:     from all iif br-lan lookup unspec 12
4200000009:     from all iif pppoe-wan lookup unspec 12
4200000009:     from all iif pppoe-wan lookup unspec 12
Windows IP Configuration

   Host Name . . . . . . . . . . . . : Pavilion
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : lan

Ethernet adapter Ethernet:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Realtek Gaming GbE Family Controller
   Physical Address. . . . . . . . . : F8-0D-AC-1A-07-4A
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Local Area Connection* 1:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 2A-CD-C4-D5-A1-5D
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Local Area Connection* 10:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2
   Physical Address. . . . . . . . . : AA-CD-C4-D5-A1-5D
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes

Wireless LAN adapter Wi-Fi:

   Connection-specific DNS Suffix  . : lan
   Description . . . . . . . . . . . : Realtek RTL8822CE 802.11ac PCIe Adapter
   Physical Address. . . . . . . . . : 28-CD-C4-D5-A1-5D
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2a02:ff0:2fc:dc9a:45ff:1e49:7ea1:cd93(Preferred)
   Temporary IPv6 Address. . . . . . : 2a02:ff0:2fc:dc9a:9890:5da0:5c33:2bd6(Preferred)
   Link-local IPv6 Address . . . . . : fe80::45ff:1e49:7ea1:cd93%6(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.1.208(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Monday, 16 May 2022 09:30:30
   Lease Expires . . . . . . . . . . : Monday, 16 May 2022 21:40:57
   Default Gateway . . . . . . . . . : fe80::8ac3:97ff:fe85:e088%6
                                       192.168.1.1
   DHCP Server . . . . . . . . . . . : 192.168.1.1
   DHCPv6 IAID . . . . . . . . . . . : 69782980
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-28-7E-D0-1A-F8-0D-AC-1A-07-4A
   DNS Servers . . . . . . . . . . . : 192.168.1.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Ethernet adapter Bluetooth Network Connection:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)
   Physical Address. . . . . . . . . : 28-CD-C4-D5-A1-5E
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Teredo Tunneling Pseudo-Interface:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Microsoft Teredo Tunneling Adapter
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2001:0:284a:364:38cb:2137:a0b9:31c5(Preferred)
   Link-local IPv6 Address . . . . . : fe80::38cb:2137:a0b9:31c5%9(Preferred)
   Default Gateway . . . . . . . . . :
   DHCPv6 IAID . . . . . . . . . . . : 234881024
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-28-7E-D0-1A-F8-0D-AC-1A-07-4A
   NetBIOS over Tcpip. . . . . . . . : Disabled

You sure do know better than me but isn't relaying something about if i get the connection successfully on router interface but connected devices have problem using the Ipv6?

A router having 2 non-bridged interfaces with the same prefix can have unpredictable results.
What is the output of tcpdump now?

exactly the same as this unfortunately.

What about now?
tcpdump -i any -evn ip6

tcpdump: listening on any, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
^C
0 packets captured
5 packets received by filter
0 packets dropped by kernel

I force closed this but there's some packets received.

PING 2606:4700:4700::1111 (2606:4700:4700::1111): 56 data bytes
^C
--- 2606:4700:4700::1111 ping statistics ---
101 packets transmitted, 0 packets received, 100% packet loss

It's a bit strange that it didn't show anything, as this filters all ipv6 packets on all interfaces. Can you try to run it again and let it run for some time, while restarting the network of a lan host? That should definitely show the packets exchanged between the lan host and the provider.

I let it run for 7-8 minutes while constantly disconnecting an reconnecting on my tablet and phone which both gets local Ipv6 adresses but there wasn't a single line entry to the terminal on my laptop.

I force quited then:

root@OpenWrt:~# tcpdump -i any -evn ip6
tcpdump: listening on any, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
^C
0 packets captured
5 packets received by filter
0 packets dropped by kernel

It must be a long shot but could it be something about OpenWrt software on this device?

It is always a possibility. Can you take a backup of the configuration, then reset to defaults? After the device comes up with clean settings, change wan interface to pppoe protocol and let it connect. wan6 interface must be using device @wan and in wan interface the ipv6 option must be 1 or manual to let it use wan6 interface.

before i do that is this something useful?

root@OpenWrt:~# killall tcpdump; tcpdump -n -i pppoe-wan
killall: tcpdump: no process killed
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on pppoe-wan, link-type LINUX_SLL (Linux cooked v1), capture size 262144 bytes
10:41:18.351804 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 412, length 64
10:41:19.062093 IP 172.217.169.170.443 > 100.96.116.98.36884: Flags [F.], seq 1258863522, ack 2347092321, win 537, options [nop,nop,TS val 2599298205 ecr 3243086220], length 0
10:41:19.285077 IP 172.217.169.170.443 > 100.96.116.98.36884: Flags [F.], seq 0, ack 1, win 537, options [nop,nop,TS val 2599298429 ecr 3243086220], length 0
10:41:19.352112 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 413, length 64
10:41:19.402960 IP 100.96.116.98.36884 > 172.217.169.170.443: Flags [.], ack 1, win 78, options [nop,nop,TS val 3243088235 ecr 2599298429,nop,nop,sack 1 {0:1}], length 0
10:41:20.352421 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 414, length 64
10:41:21.352728 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 415, length 64
10:41:22.200017 IP 100.96.116.98.52340 > 40.74.3.100.3544: UDP, length 61
10:41:22.245842 IP 40.74.3.100.3544 > 100.96.116.98.52340: UDP, length 109
10:41:22.353035 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 416, length 64
10:41:22.754096 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [P.], seq 1175896929:1175896974, ack 3808169200, win 6994, length 45
10:41:22.755871 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [P.], seq 45:83, ack 1, win 6994, length 38
10:41:22.757968 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [.], ack 83, win 513, length 0
10:41:22.758225 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [P.], seq 1:43, ack 83, win 513, length 42
10:41:22.851321 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [.], ack 43, win 6994, length 0
10:41:23.353372 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 417, length 64
10:41:24.353676 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 418, length 64
10:41:24.846602 IP 40.90.9.180.443 > 100.96.116.98.64949: Flags [P.], seq 965435014:965435045, ack 1471911259, win 2047, length 31
10:41:24.852300 IP 100.96.116.98.64949 > 40.90.9.180.443: Flags [.], ack 31, win 1020, length 0
10:41:25.196398 IP 184.104.202.142.443 > 100.96.116.98.64985: Flags [P.], seq 2337863534:2337864012, ack 3610135778, win 83, length 478
10:41:25.200745 IP 100.96.116.98.64985 > 184.104.202.142.443: Flags [P.], seq 1:36, ack 478, win 512, length 35
10:41:25.259591 IP 184.104.202.142.443 > 100.96.116.98.64985: Flags [.], ack 36, win 83, length 0
10:41:25.353978 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 419, length 64
10:41:26.354284 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 420, length 64
10:41:27.354591 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 421, length 64
10:41:27.922154 IP 100.96.116.98.50505 > 8.219.48.186.8053: UDP, length 32
10:41:28.226125 IP 8.219.48.186.8053 > 100.96.116.98.50505: UDP, length 32
10:41:28.354898 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 422, length 64
10:41:29.109487 IP 100.96.116.98.35882 > 194.27.156.207.123: NTPv4, Client, length 48
10:41:29.140171 IP 194.27.156.207.123 > 100.96.116.98.35882: NTPv4, Server, length 48
10:41:29.355204 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 423, length 64
10:41:29.596586 IP 104.22.8.20.443 > 100.96.116.98.54144: UDP, length 54
10:41:29.602238 IP 100.96.116.98.54144 > 104.22.8.20.443: UDP, length 45
10:41:30.355504 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 424, length 64
10:41:31.355859 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 425, length 64
10:41:32.356165 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 426, length 64
10:41:33.187731 IP 100.96.116.98.64950 > 13.89.223.27.443: Flags [P.], seq 3886643226:3886643261, ack 1145169548, win 1020, length 35
10:41:33.356477 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 427, length 64
10:41:33.392929 IP 13.89.223.27.443 > 100.96.116.98.64950: Flags [.], ack 35, win 2049, length 0
10:41:34.181685 IP 100.96.116.98.64941 > 146.75.0.193.443: Flags [.], seq 3675183607:3675183608, ack 3657447893, win 514, length 1
10:41:34.212901 IP 146.75.0.193.443 > 100.96.116.98.64941: Flags [.], ack 1, win 290, options [nop,nop,sack 1 {0:1}], length 0
10:41:34.356809 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 428, length 64
10:41:34.549290 IP 100.96.116.98.64937 > 151.101.193.69.443: Flags [.], seq 832526709:832526710, ack 1826738357, win 1026, length 1
10:41:34.564664 IP 151.101.193.69.443 > 100.96.116.98.64937: Flags [.], ack 1, win 325, options [nop,nop,sack 1 {0:1}], length 0
10:41:34.682852 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [P.], seq 43:146, ack 83, win 513, length 103
10:41:34.682967 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [P.], seq 146:192, ack 83, win 513, length 46
10:41:34.683035 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [P.], seq 192:781, ack 83, win 513, length 589
10:41:34.734412 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [.], ack 146, win 6994, length 0
10:41:34.734412 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [.], ack 192, win 6994, length 0
10:41:34.734745 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [P.], seq 83:142, ack 192, win 6994, length 59
10:41:34.747952 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [P.], seq 142:552, ack 781, win 7016, length 410
10:41:34.750581 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [.], ack 552, win 511, length 0
10:41:34.752901 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [P.], seq 781:823, ack 552, win 511, length 42
10:41:34.768945 IP 100.96.116.98.64492 > 104.244.42.129.443: Flags [.], seq 3898112539:3898112540, ack 4045404526, win 510, length 1
10:41:34.827160 IP 104.244.42.129.443 > 100.96.116.98.64492: Flags [.], ack 1, win 846, options [nop,nop,sack 1 {0:1}], length 0
10:41:34.847412 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [.], ack 823, win 7016, length 0
10:41:34.850410 IP 40.90.9.180.443 > 100.96.116.98.64949: Flags [P.], seq 31:62, ack 1, win 2047, length 31
10:41:34.852718 IP 100.96.116.98.64949 > 40.90.9.180.443: Flags [.], ack 62, win 1020, length 0
10:41:35.357114 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 429, length 64
10:41:36.357434 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 430, length 64
10:41:37.357739 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 431, length 64
10:41:38.358053 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 432, length 64
10:41:38.593421 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [P.], seq 823:906, ack 552, win 511, length 83
10:41:38.645185 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [.], ack 906, win 7016, length 0
10:41:38.660488 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [P.], seq 552:1077, ack 906, win 7016, length 525
10:41:38.711322 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [.], ack 1077, win 509, length 0
10:41:38.907766 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [P.], seq 906:1021, ack 1077, win 509, length 115
10:41:38.999442 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [.], ack 1021, win 7016, length 0
10:41:39.002336 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [.], seq 1077:2477, ack 1021, win 7016, length 1400
10:41:39.002336 IP 139.59.210.197.443 > 100.96.116.98.63283: Flags [P.], seq 2477:2545, ack 1021, win 7016, length 68
10:41:39.005161 IP 100.96.116.98.63283 > 139.59.210.197.443: Flags [.], ack 2545, win 514, length 0
10:41:39.250486 IP6 fe80::be4a:56ff:fe4f:5080 > ff02::1: ICMP6, router advertisement, length 96
10:41:39.358361 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 433, length 64
10:41:40.358810 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 434, length 64
10:41:40.361556 IP6 fe80::6c07:a1bc:7cc5:615e > ff02::16: HBH ICMP6, multicast listener report v2, 9 group record(s), length 188
10:41:40.745321 IP6 fe80::6c07:a1bc:7cc5:615e > ff02::16: HBH ICMP6, multicast listener report v2, 9 group record(s), length 188
10:41:41.359111 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 435, length 64
10:41:41.377746 IP 100.96.116.98.52340 > 40.74.3.100.3544: UDP, length 61
10:41:41.423479 IP 40.74.3.100.3544 > 100.96.116.98.52340: UDP, length 109
10:41:42.359412 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 436, length 64
10:41:43.295876 IP 100.96.116.98.63227 > 20.199.120.85.443: Flags [P.], seq 1784445491:1784445592, ack 144939445, win 511, length 101
10:41:43.346238 IP 20.199.120.85.443 > 100.96.116.98.63227: Flags [P.], seq 1:172, ack 101, win 7067, length 171
10:41:43.359722 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 437, length 64
10:41:43.402809 IP 100.96.116.98.63227 > 20.199.120.85.443: Flags [.], ack 172, win 510, length 0
10:41:44.360028 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 438, length 64
10:41:44.606608 IP 100.96.116.98.54144 > 104.22.8.20.443: UDP, length 45
10:41:44.612685 IP 104.22.8.20.443 > 100.96.116.98.54144: UDP, length 25
10:41:44.746016 IP 100.96.116.98.43425 > 173.194.79.188.5228: Flags [P.], seq 1356738376:1356738404, ack 153885290, win 216, options [nop,nop,TS val 237883862 ecr 2459935182], length 28
10:41:44.795023 IP 173.194.79.188.5228 > 100.96.116.98.43425: Flags [P.], seq 1:27, ack 28, win 267, options [nop,nop,TS val 2460225473 ecr 237883862], length 26
10:41:44.797774 IP 100.96.116.98.43425 > 173.194.79.188.5228: Flags [.], ack 27, win 216, options [nop,nop,TS val 237883880 ecr 2460225473], length 0
10:41:44.864980 IP 40.90.9.180.443 > 100.96.116.98.64949: Flags [P.], seq 62:93, ack 1, win 2047, length 31
10:41:44.868167 IP 100.96.116.98.64949 > 40.90.9.180.443: Flags [.], ack 93, win 1020, length 0
10:41:45.360345 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 439, length 64
10:41:45.509393 IP 100.96.116.98.63228 > 20.199.120.85.443: Flags [P.], seq 4149713163:4149713266, ack 253211225, win 514, length 103
10:41:45.559269 IP 20.199.120.85.443 > 100.96.116.98.63228: Flags [P.], seq 1:174, ack 103, win 6853, length 173
10:41:45.603829 IP 100.96.116.98.63228 > 20.199.120.85.443: Flags [.], ack 174, win 513, length 0
10:41:45.731356 IP 100.96.116.98.64940 > 198.252.206.25.443: Flags [.], seq 1337624305:1337624306, ack 3357517743, win 509, length 1
10:41:45.854737 IP 198.252.206.25.443 > 100.96.116.98.64940: Flags [.], ack 1, win 62, options [nop,nop,sack 1 {0:1}], length 0
10:41:46.360654 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 440, length 64
10:41:47.320045 IP 100.96.116.98.64942 > 198.252.206.25.443: Flags [.], seq 2931856837:2931856838, ack 3465307681, win 512, length 1
10:41:47.360961 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 441, length 64
10:41:47.443511 IP 198.252.206.25.443 > 100.96.116.98.64942: Flags [.], ack 1, win 62, options [nop,nop,sack 1 {0:1}], length 0
10:41:47.922195 IP 100.96.116.98.50505 > 8.219.48.186.8053: UDP, length 32
10:41:48.226267 IP 8.219.48.186.8053 > 100.96.116.98.50505: UDP, length 32
10:41:48.361315 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 442, length 64
10:41:49.029081 IP 93.184.220.70.443 > 100.96.116.98.48746: Flags [.], ack 2973865845, win 133, length 0
10:41:49.054322 IP 68.232.34.217.443 > 100.96.116.98.49254: Flags [.], ack 3878313341, win 133, length 0
10:41:49.273108 IP 100.96.116.98.49254 > 68.232.34.217.443: Flags [.], ack 1, win 172, length 0
10:41:49.273223 IP 100.96.116.98.48746 > 93.184.220.70.443: Flags [.], ack 1, win 161, length 0
10:41:49.300799 IP 100.96.116.98.42044 > 157.240.234.34.443: Flags [R.], seq 238021736, ack 2287131363, win 135, length 0
10:41:49.302752 IP 100.96.116.98.39348 > 157.240.234.18.443: Flags [R.], seq 360121523, ack 4069983463, win 133, length 0
10:41:49.302857 IP 100.96.116.98.43978 > 104.244.42.130.443: Flags [F.], seq 4166764896, ack 2499097327, win 135, length 0
10:41:49.302922 IP 100.96.116.98.48746 > 93.184.220.70.443: Flags [F.], seq 1, ack 1, win 161, length 0
10:41:49.303106 IP 100.96.116.98.49254 > 68.232.34.217.443: Flags [F.], seq 1, ack 1, win 172, length 0
10:41:49.303389 IP 100.96.116.98.43778 > 209.237.198.128.443: Flags [F.], seq 322965606, ack 1809135230, win 135, length 0
10:41:49.303484 IP 100.96.116.98.48676 > 157.240.9.54.443: Flags [F.], seq 2020435641, ack 3618206497, win 131, length 0
10:41:49.339921 IP 68.232.34.217.443 > 100.96.116.98.49254: Flags [F.], seq 1, ack 2, win 133, length 0
10:41:49.341446 IP 100.96.116.98.49254 > 68.232.34.217.443: Flags [.], ack 2, win 172, length 0
10:41:49.345900 IP 93.184.220.70.443 > 100.96.116.98.48746: Flags [F.], seq 1, ack 2, win 133, length 0
10:41:49.347446 IP 209.237.198.128.443 > 100.96.116.98.43778: Flags [P.], seq 1:25, ack 1, win 265, length 24
10:41:49.347655 IP 209.237.198.128.443 > 100.96.116.98.43778: Flags [F.], seq 25, ack 1, win 265, length 0
10:41:49.348573 IP 100.96.116.98.48746 > 93.184.220.70.443: Flags [.], ack 2, win 161, length 0
10:41:49.350515 IP 100.96.116.98.43778 > 209.237.198.128.443: Flags [R], seq 322965607, win 0, length 0
10:41:49.351789 IP 100.96.116.98.43778 > 209.237.198.128.443: Flags [R], seq 322965607, win 0, length 0
10:41:49.361544 IP 104.244.42.130.443 > 100.96.116.98.43978: Flags [P.], seq 1:25, ack 1, win 265, length 24
10:41:49.361765 IP 104.244.42.130.443 > 100.96.116.98.43978: Flags [F.], seq 25, ack 1, win 265, length 0
10:41:49.361983 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 443, length 64
10:41:49.364697 IP 100.96.116.98.43978 > 104.244.42.130.443: Flags [R], seq 4166764897, win 0, length 0
10:41:49.364966 IP 100.96.116.98.43978 > 104.244.42.130.443: Flags [R], seq 4166764897, win 0, length 0
10:41:49.389542 IP 157.240.9.54.443 > 100.96.116.98.48676: Flags [.], ack 1, win 261, length 0
10:41:49.472432 IP 157.240.9.54.443 > 100.96.116.98.48676: Flags [F.], seq 1, ack 1, win 261, length 0
10:41:49.612569 IP 157.240.9.54.443 > 100.96.116.98.48676: Flags [F.], seq 1, ack 1, win 261, length 0
10:41:49.756543 IP 157.240.9.54.443 > 100.96.116.98.48676: Flags [F.], seq 1, ack 1, win 261, length 0
10:41:50.037561 IP 157.240.9.54.443 > 100.96.116.98.48676: Flags [F.], seq 1, ack 1, win 261, length 0
10:41:50.362314 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 444, length 64
10:41:50.644814 IP 157.240.9.54.443 > 100.96.116.98.48676: Flags [F.], seq 1, ack 1, win 261, length 0
10:41:51.362627 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 445, length 64
10:41:51.797571 IP 157.240.9.54.443 > 100.96.116.98.48676: Flags [F.], seq 1, ack 1, win 261, length 0
10:41:52.362932 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 446, length 64
10:41:53.363241 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 447, length 64
10:41:54.036840 IP 157.240.9.54.443 > 100.96.116.98.48676: Flags [F.], seq 1, ack 1, win 261, length 0
10:41:54.363548 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 448, length 64
10:41:54.866061 IP 40.90.9.180.443 > 100.96.116.98.64949: Flags [P.], seq 93:124, ack 1, win 2047, length 31
10:41:54.869281 IP 100.96.116.98.64949 > 40.90.9.180.443: Flags [.], ack 124, win 1020, length 0
10:41:55.363853 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 449, length 64
10:41:56.063689 IP 100.96.116.98.64966 > 142.250.187.132.443: Flags [.], seq 2406714257:2406714258, ack 2714818815, win 1027, length 1
10:41:56.078563 IP 142.250.187.132.443 > 100.96.116.98.64966: Flags [.], ack 1, win 504, options [nop,nop,sack 1 {0:1}], length 0
10:41:56.364162 IP6 2a02:ff0:2fc:dc9a::1 > 2606:4700:4700::1111: ICMP6, echo request, seq 450, length 64
^C
148 packets captured
148 packets received by filter
0 packets dropped by kernel

There are a lot of pings going out of the interface, but no reply coming back in. Basically that would mean that something is not working properly with your ISP.
Can you try one last thing, to ping using the IPv6 of the wan interface: ping -6 -I 2a02:ff0:2fc:dc9a:c522:9d83:58eb:5f19 google.com

root@OpenWrt:~# ping -6 -I 2a02:ff0:2fc:dc9a:c522:9d83:58eb:5f19 google.com
PING google.com (2a00:1450:4017:80a::200e) from 2a02:ff0:2fc:dc9a:c522:9d83:58eb:5f19: 56 data bytes
ping: bind: Address not available

Use the address that pppoe-wan has, maybe it changed since the last post.

root@OpenWrt:~# ping -6 -I 2a02:ff0:2fc:dc9a:6c07:a1bc:7cc5:615e google.com
PING google.com (2a00:1450:4017:808::200e) from 2a02:ff0:2fc:dc9a:6c07:a1bc:7cc5:615e: 56 data bytes
^C
--- google.com ping statistics ---
18 packets transmitted, 0 packets received, 100% packet loss

There's word around the local Turknet forum that a moderator at there said that Turknet engineers are working on a " new ipv6 structure" that will fix all the problems they're facing right now and no matter the model or make of the routers/modems customers have, ipv6 will work for everyone but no change in prefix size which is shame.

something is not working properly with your ISP

if we are confirming this, i'll let go this whole ipv6 mess and move on.

in this dump i managed to capture more succesfful ipv6 connections:

11:19:18.768853 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46032 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 2189518685, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:18.768990 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46034 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 759984023, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:18.842039 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46044 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 4255913636, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:18.842173 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46042 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 1637697598, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:18.842255 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46048 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 274320790, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:18.942848 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46050 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 3027903868, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:18.943004 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46716 > 2a02:ff0:2:2:face:b00c:3333:a3f.443: Flags [SEW], seq 870026180, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:18.955472 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46052 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 712361155, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:19.047175 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46054 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 4177367082, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:19.195560 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46056 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 1869891096, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:19.385309 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46058 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 3111957882, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:19.421564 IP6 fe80::6c07:a1bc:7cc5:615e > ff02::16: HBH ICMP6, multicast listener report v2, 9 group record(s), length 188
11:19:19.481504 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.47991 > 2a02:ff0:2:2:face:b00c:3333:a3f.443: UDP, length 1232
11:19:19.987328 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46716 > 2a02:ff0:2:2:face:b00c:3333:a3f.443: Flags [S], seq 870026180, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:20.105335 IP6 fe80::6c07:a1bc:7cc5:615e > ff02::16: HBH ICMP6, multicast listener report v2, 9 group record(s), length 188
11:19:20.289565 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.39918 > 2a03:2880:f228:c5:face:b00c:0:167.443: Flags [S], seq 1900011470, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:20.929105 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46050 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 3027903868, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:20.929284 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46034 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 759984023, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:20.929393 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46048 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 274320790, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:20.930109 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46044 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 4255913636, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:20.930243 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46032 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 2189518685, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:20.930332 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46042 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 1637697598, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:21.127023 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [P.], seq 1407:1684, ack 433, win 133, length 277
11:19:21.142303 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46054 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 4177367082, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:21.142434 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46052 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 712361155, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:21.172170 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [.], ack 1684, win 272, length 0
11:19:21.194372 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [P.], seq 1684:1932, ack 433, win 133, length 248
11:19:21.239388 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [.], ack 1932, win 278, length 0
11:19:21.281644 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 433:459, ack 1932, win 278, length 26
11:19:21.283831 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 459, win 133, length 0
11:19:21.315890 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 459:516, ack 1932, win 278, length 57
11:19:21.316118 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 516:573, ack 1932, win 278, length 57
11:19:21.317400 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 516, win 133, length 0
11:19:21.317696 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 573, win 133, length 0
11:19:21.348889 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 573:599, ack 1932, win 278, length 26
11:19:21.350871 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 599, win 133, length 0
11:19:21.355525 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46056 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 1869891096, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:21.378647 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 599:656, ack 1932, win 278, length 57
11:19:21.378863 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 656:713, ack 1932, win 278, length 57
11:19:21.381121 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 656, win 133, length 0
11:19:21.381406 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 713, win 133, length 0
11:19:21.460316 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.47991 > 2a02:ff0:2:2:face:b00c:3333:a3f.443: UDP, length 1232
11:19:21.583134 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46058 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 3111957882, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:21.648042 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [P.], seq 1932:2184, ack 713, win 133, length 252
11:19:21.667663 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [P.], seq 2184:2405, ack 713, win 133, length 221
11:19:21.693143 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [.], ack 2184, win 283, length 0
11:19:21.712392 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [.], ack 2405, win 289, length 0
11:19:21.802891 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 713:739, ack 2405, win 289, length 26
11:19:21.822136 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 739:765, ack 2405, win 289, length 26
11:19:21.823100 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 739, win 133, length 0
11:19:21.824386 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 765, win 133, length 0
11:19:21.838147 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 765:822, ack 2405, win 289, length 57
11:19:21.838412 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 822:879, ack 2405, win 289, length 57
11:19:21.839545 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 822, win 133, length 0
11:19:21.840774 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 879, win 133, length 0
11:19:21.846891 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 879:936, ack 2405, win 289, length 57
11:19:21.847091 IP 157.240.9.13.443 > 100.96.116.98.38758: Flags [P.], seq 936:993, ack 2405, win 289, length 57
11:19:21.849098 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 936, win 133, length 0
11:19:21.849531 IP 100.96.116.98.38758 > 157.240.9.13.443: Flags [.], ack 993, win 133, length 0
11:19:22.013517 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46716 > 2a02:ff0:2:2:face:b00c:3333:a3f.443: Flags [S], seq 870026180, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:22.223196 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.38616 > 2606:2800:134:1a0d:1429:742:782:b6.443: Flags [S], seq 3192417444, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:22.351549 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.39094 > 2001:4860:4806:8::.123: NTPv3, Client, length 48
11:19:22.433717 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.38620 > 2606:2800:134:1a0d:1429:742:782:b6.443: Flags [S], seq 1832729733, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:22.433852 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.38618 > 2606:2800:134:1a0d:1429:742:782:b6.443: Flags [S], seq 2987455684, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:23.311388 IP 100.96.116.98.65198 > 54.218.181.126.443: Flags [.], seq 0:1, ack 1, win 513, length 1
11:19:23.523415 IP 54.218.181.126.443 > 100.96.116.98.65198: Flags [.], ack 1, win 132, options [nop,nop,sack 1 {0:1}], length 0
11:19:23.908334 IP 100.96.116.98.55504 > 108.177.96.188.5228: Flags [P.], seq 2723585113:2723585151, ack 4285968561, win 72, options [nop,nop,TS val 2362482334 ecr 2084042301], length 38
11:19:23.956225 IP 108.177.96.188.5228 > 100.96.116.98.55504: Flags [.], ack 38, win 265, options [nop,nop,TS val 2084159580 ecr 2362482334], length 0
11:19:23.984552 IP 100.96.116.98.55504 > 108.177.96.188.5228: Flags [P.], seq 38:64, ack 1, win 72, options [nop,nop,TS val 2362482436 ecr 2084159580], length 26
11:19:24.032166 IP 108.177.96.188.5228 > 100.96.116.98.55504: Flags [.], ack 64, win 265, options [nop,nop,TS val 2084159656 ecr 2362482436], length 0
11:19:24.032988 IP 108.177.96.188.5228 > 100.96.116.98.55504: Flags [P.], seq 1:27, ack 64, win 265, options [nop,nop,TS val 2084159657 ecr 2362482436], length 26
11:19:24.036169 IP 100.96.116.98.55504 > 108.177.96.188.5228: Flags [.], ack 27, win 72, options [nop,nop,TS val 2362482488 ecr 2084159657], length 0
11:19:24.369423 IP 192.99.44.195.443 > 100.96.116.98.64750: Flags [P.], seq 24:48, ack 29, win 63784, length 24
11:19:24.373647 IP 100.96.116.98.64750 > 192.99.44.195.443: Flags [P.], seq 29:57, ack 48, win 509, length 28
11:19:24.541167 IP 192.99.44.195.443 > 100.96.116.98.64750: Flags [.], ack 57, win 63784, length 0
11:19:24.998355 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46032 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 2189518685, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:24.998488 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46048 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 274320790, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:24.998573 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46042 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 1637697598, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:24.999275 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46034 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 759984023, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:24.999418 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46050 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 3027903868, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
11:19:24.999503 IP6 2a02:ff0:2fc:dc9a:ed5d:1646:a56f:a4ce.46044 > 2a03:2880:f228:c4:face:b00c:0:43fe.443: Flags [S], seq 4255913636, win 65535, options [mss 1432,nop,nop,sackOK,nop,wscale 9], length 0
^C

I roamed Twitter and Instagram while capturing and for some reason Twitter is loading fine but Instagram is always fails to load new images.

So it seems to be a broader issue and not just limited to you.
The capture shows all IPv6 packets stuck in SYN state, nothing came back to them.

Twitter seems to fallback to IPv4.
I'd suggest to disable IPv6 until your ISP fixes their problems. If you want to experiment with IPv6, there is always he.net tunnel.

1 Like