Hi Jeff, On Thu, 31 Jan 2008, Jeff Chua wrote: > On the bad run, I got the following message ... > > boston kernel: nf_ct_tcp: invalid packed ignored IN= OUT= > SRC=127.0.0.1 DST=127.0.0.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=8162 > DF PROTO=TCP SPT=1016 DPT=515 SEQ=3834958843 ACK=0 WINDOW=32792 > RES=0x00 SYN URGP=0 OPT (0204400C0402080A0000CC190000000001030307) > UID=0 GID=65534 I can't find this packet in the last lo.bad pcap file. Could you dump the bad traffic and send it together with the generated log record? Strange, but there are a lot of incorrect checksum packets. How does it come on the loopback interface? Best regards, Jozsef - E-mail : kadlec@xxxxxxxxxxxxxxxxx, kadlec@xxxxxxxxxxxxxxx PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt Address : KFKI Research Institute for Particle and Nuclear Physics H-1525 Budapest 114, POB. 49, Hungary - To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html