Hmmm, can you tell me how I actually check reverse path filtering and turn debugging on? Sorry, I'm neither a iptables nor a kernel guru :-/
Take a look at /proc/sys/net/ipv4/conf/<device|all|default>/rp_filter to see if it is "1" or "0". As I understand it reverse path filter(ing) is a kernel level filter feature that will only allow traffic with a specific source address to come in on the interface that it is connected to. This would explain why you might be getting the reset packet if reverse path filtering is turned on on your eth0 device.
Set them all to either 0 or 1 - still the same picture, the reply from the remote server results (in tcpdump) in the one with "win 0" being sent back instead of passing it to eth0.
Any idea whom I could ask here for help? Maybe the Linux kernel mailing list? Or is there a more specialised one for networking issues?
Cheers, Albrecht.
-- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Albrecht Dreß - Johanna-Kirchner-Straße 13 - D-53123 Bonn (Germany) Phone (+49) 228 6199571 - mailto:albrecht.dress@xxxxxxxx GnuPG public key: http://home.arcor.de/dralbrecht.dress/pubkey.asc _________________________________________________________________________
Attachment:
pgpEh1eA55Pwb.pgp
Description: PGP signature