I thought only a SYN packet should create a new connection, but PSH packets seem to do it, too, now. We are trying to delete conntracker connections, but finding they are reappearing, even though we are trying to drop anything with a --ctstate of INVALID. Our assumption was that if we deleted the connection, that any further TCP packets for that flow would have a ctstate of INVALID, and be dropped. This worked with 2.6.38, but doesn't work with 2.6.39.1. For example, if I make an rdesktop connection to from .125 to dport 3389, conntrack -E shows it appearing: [NEW] tcp 6 433025 ESTABLISHED src=192.168.41.125 dst=192.168.1.20 sport=38916 dport=3389 [UNREPLIED] src=192.168.1.20 dst=192.168.41.125 sport=3389 dport=38916 [UPDATE] tcp 6 432000 src=192.168.41.125 dst=192.168.1.20 sport=38916 dport=3389 src=192.168.1.20 dst=192.168.41.125 sport=3389 dport=38916 [ASSURED] If I call conntrack -D to delete it, it goes away: [DESTROY] tcp 6 src=192.168.41.125 dst=192.168.1.20 sport=38916 dport=3389 src=192.168.1.20 dst=192.168.41.125 sport=3389 dport=38916 [ASSURED] I have an iptables rule of: -A FORWARD -m conntrack --ctstate INVALID -j DROP The next rdesktop packets cause the connection to be reestablished: [NEW] tcp 6 432962 ESTABLISHED src=192.168.41.125 dst=192.168.1.20 sport=38916 dport=3389 [UNREPLIED] src=192.168.1.20 dst=192.168.41.125 sport=3389 dport=38916 [UPDATE] tcp 6 432000 src=192.168.41.125 dst=192.168.1.20 sport=38916 dport=3389 src=192.168.1.20 dst=192.168.41.125 sport=3389 dport=38916 [UPDATE] tcp 6 431999 src=192.168.41.125 dst=192.168.1.20 sport=38916 dport=3389 src=192.168.1.20 dst=192.168.41.125 sport=3389 dport=38916 [ASSURED] when they used to be discarded with 2.6.38. Can anybody shed some light on this? Thanks, Sam Btw - our full iptables dump. We have snort running on NFQ number 0. root@x86-gaia:~# iptables-save # Generated by iptables-save v1.4.11.1 on Fri Jun 24 01:01:46 2011 *filter :INPUT DROP [3:695] :FORWARD ACCEPT [522:26283] :OUTPUT ACCEPT [4930:1165363] :LOG_AND_QUEUE - [0:0] :USER - [0:0] -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A INPUT -i lo -j ACCEPT -A INPUT -i eth1 -p icmp -m icmp --icmp-type 8 -j ACCEPT -A INPUT -i eth1 -p tcp -m multiport --dports 80,443,22 -j ACCEPT -A INPUT -i eth1 -p udp -m udp --dport 161 -j DROP -A INPUT -i eth0 -p tcp -m multiport --dports 80,443 -j ACCEPT -A INPUT -i eth0 -p udp -m udp --dport 161 -j DROP -A INPUT -p udp -m udp --sport 123 -j ACCEPT -A INPUT -i eth1 -p udp -m multiport --dports 53,67 -j ACCEPT -A INPUT -i eth0 -j NFQUEUE --queue-num 0 -A FORWARD -m conntrack --ctstate INVALID -j DROP -A FORWARD -j USER -A FORWARD -m state --state RELATED,ESTABLISHED -j NFQUEUE --queue-num 0 -A LOG_AND_QUEUE -m limit --limit 15/min -j LOG -A LOG_AND_QUEUE -j NFQUEUE --queue-num 0 COMMIT # Completed on Fri Jun 24 01:01:46 2011 root@x86-gaia:~# uname -a Linux x86-gaia 2.6.39.1 #1 SMP Wed Jun 22 14:53:50 PDT 2011 i686 unknown -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html