CT container can't access network

Dec 13, 2021
24
5
8
Hi so i have one old CT container, that can access the network just fine
But when i create a new one it manages to get an IP but that is about it..

Working CTBroken CT
pct config 210
Code:
arch: amd64
cores: 4
features: nesting=1
hostname: emby
memory: 2048
mp0: /storage/movies,mp=/mnt/movies
mp1: /storage/series,mp=/mnt/series
mp2: /storage/emby,mp=/var/lib/emby
net0: name=eth0,bridge=vmbr0,firewall=1,hwaddr=26:07:EC:8E:2E:51,ip=dhcp,tag=20,type=veth
onboot: 0
ostype: debian
rootfs: storage:subvol-210-disk-0,size=32G
swap: 2048
unprivileged: 1
lxc.cgroup2.devices.allow: c 226:0 rwm
lxc.cgroup2.devices.allow: c 226:128 rwm
lxc.cgroup2.devices.allow: c 29:0 rwm
lxc.mount.entry: /dev/dri/card0 dev/dri/card0 none bind,optional,create=file
lxc.mount.entry: /dev/dri dev/dri none bind,optional,create=dir
lxc.mount.entry: /dev/dri/renderD128 dev/renderD128 none bind,optional,create=file
lxc.idmap: u 0 100000 44
lxc.idmap: g 0 100000 44
lxc.idmap: u 44 44 1
lxc.idmap: g 44 44 1
lxc.idmap: u 45 100045 60
lxc.idmap: g 45 100045 60
lxc.idmap: u 105 103 1
lxc.idmap: g 105 103 1
lxc.idmap: u 106 100106 892
lxc.idmap: g 106 100106 892
lxc.idmap: u 998 10210 1
lxc.idmap: g 998 10210 1
lxc.idmap: u 999 100999 64537
lxc.idmap: g 999 100999 64537
config (pct config 100)
Code:
arch: amd64
cores: 1
features: nesting=1
hostname: test
memory: 512
net0: name=eth0,bridge=vmbr0,hwaddr=BC:24:11:79:CA:FC,ip=dhcp,tag=20,type=veth
ostype: debian
rootfs: storage:subvol-100-disk-0,size=8G
swap: 512
unprivileged: 1
ip link
Code:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0@if14: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000
    link/ether 26:07:ec:8e:2e:51 brd ff:ff:ff:ff:ff:ff link-netnsid 0
ip link
Code:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0@if48: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000
    link/ether bc:24:11:79:ca:fc brd ff:ff:ff:ff:ff:ff link-netnsid 0
cat /etc/network/interfaces
Code:
auto lo
iface lo inet loopback

auto eth0
iface eth0 inet dhcp
cat /etc/network/interfaces
Code:
auto lo
iface lo inet loopback

auto eth0
iface eth0 inet dhcp
cat /etc/resolv.conf
Code:
domain localdomain
search localdomain
nameserver 192.168.20.1
cat /etc/resolv.conf
Code:
domain localdomain
search localdomain
nameserver 192.168.20.1
ip neighbor show
Code:
192.168.20.1 dev eth0 lladdr 00:e0:97:1c:b7:16 STALE
192.168.20.230 dev eth0 lladdr 46:4a:5e:3c:8a:49 STALE
ip neighbor show
Code:
192.168.20.1 dev eth0 FAILED
ip r
Code:
default via 192.168.20.1 dev eth0
192.168.20.0/24 dev eth0 proto kernel scope link src 192.168.20.157
ip r
Code:
default via 192.168.20.1 dev eth0
192.168.20.0/24 dev eth0 proto kernel scope link src 192.168.20.158
ip a
Code:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0@if14: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    link/ether 26:07:ec:8e:2e:51 brd ff:ff:ff:ff:ff:ff link-netnsid 0
    inet 192.168.20.157/24 brd 192.168.20.255 scope global dynamic eth0
       valid_lft 6282sec preferred_lft 6282sec
    inet6 fe80::2407:ecff:fe8e:2e51/64 scope link
       valid_lft forever preferred_lft forever
ip a
Code:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute
       valid_lft forever preferred_lft forever
2: eth0@if48: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    link/ether bc:24:11:79:ca:fc brd ff:ff:ff:ff:ff:ff link-netnsid 0
    inet 192.168.20.158/24 brd 192.168.20.255 scope global dynamic eth0
       valid_lft 4796sec preferred_lft 4796sec
    inet6 fe80::be24:11ff:fe79:cafc/64 scope link
       valid_lft forever preferred_lft forever
ping 192.168.20.1
Code:
PING 192.168.20.1 (192.168.20.1) 56(84) bytes of data.
64 bytes from 192.168.20.1: icmp_seq=1 ttl=64 time=0.184 ms
64 bytes from 192.168.20.1: icmp_seq=2 ttl=64 time=0.161 ms
64 bytes from 192.168.20.1: icmp_seq=3 ttl=64 time=0.162 ms
^C
--- 192.168.20.1 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2036ms
rtt min/avg/max/mdev = 0.161/0.169/0.184/0.010 ms
ping 192.168.20.1
Code:
PING 192.168.20.1 (192.168.20.1) 56(84) bytes of data.
From 192.168.20.158 icmp_seq=1 Destination Host Unreachable
From 192.168.20.158 icmp_seq=2 Destination Host Unreachable
From 192.168.20.158 icmp_seq=3 Destination Host Unreachable
From 192.168.20.158 icmp_seq=4 Destination Host Unreachable
From 192.168.20.158 icmp_seq=5 Destination Host Unreachable
From 192.168.20.158 icmp_seq=6 Destination Host Unreachable
From 192.168.20.158 icmp_seq=7 Destination Host Unreachable
From 192.168.20.158 icmp_seq=8 Destination Host Unreachable
From 192.168.20.158 icmp_seq=9 Destination Host Unreachable
From 192.168.20.158 icmp_seq=10 Destination Host Unreachable
From 192.168.20.158 icmp_seq=11 Destination Host Unreachable
From 192.168.20.158 icmp_seq=12 Destination Host Unreachable
--- 192.168.20.1 ping statistics ---
13 packets transmitted, 0 received, +12 errors, 100% packet loss, time 12308ms
Ping from proxmox
ping 192.168.20.157
Code:
PING 192.168.20.157 (192.168.20.157) 56(84) bytes of data.
64 bytes from 192.168.20.157: icmp_seq=1 ttl=63 time=0.330 ms
64 bytes from 192.168.20.157: icmp_seq=2 ttl=63 time=0.230 ms
^C
--- 192.168.20.157 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1035ms
rtt min/avg/max/mdev = 0.230/0.280/0.330/0.050 ms
Ping from proxmox
ping 192.168.20.158
Code:
PING 192.168.20.158 (192.168.20.158) 56(84) bytes of data.
^C
--- 192.168.20.158 ping statistics ---
25 packets transmitted, 0 received, 100% packet loss, time 24552ms
ip route list
Code:
default via 192.168.20.1 dev eth0
192.168.20.0/24 dev eth0 proto kernel scope link src 192.168.20.157
ip route list
Code:
default via 192.168.20.1 dev eth0
192.168.20.0/24 dev eth0 proto kernel scope link src 192.168.20.158

The network configuration on proxmox
cat /etc/network/interfaces
Code:
# network interface settings; autogenerated
# Please do NOT modify this file directly, unless you know what
# you're doing.
#
# If you want to manage parts of the network configuration manually,
# please utilize the 'source' or 'source-directory' directives to do
# so.
# PVE will preserve these directives, but will NOT read its network
# configuration from sourced files, so do not attempt to move any of
# the PVE managed interfaces into external files!


auto lo
iface lo inet loopback


iface enp6s0 inet manual


iface enp0s31f6 inet manual


auto vmbr0
iface vmbr0 inet static
        address 192.168.98.160/24
        gateway 192.168.98.1
        bridge-ports enp6s0
        bridge-stp off
        bridge-fd 0

pveversion --verbose
Code:
proxmox-ve: 8.2.0 (running kernel: 6.8.8-2-pve)
pve-manager: 8.2.4 (running version: 8.2.4/faa83925c9641325)
proxmox-kernel-helper: 8.1.0
pve-kernel-5.15: 7.4-14
proxmox-kernel-6.8: 6.8.8-2
proxmox-kernel-6.8.8-2-pve-signed: 6.8.8-2
pve-kernel-5.15.158-1-pve: 5.15.158-1
pve-kernel-5.15.131-2-pve: 5.15.131-3
pve-kernel-5.15.30-2-pve: 5.15.30-3
ceph-fuse: 16.2.11+ds-2
corosync: 3.1.7-pve3
criu: 3.17.1-2
glusterfs-client: 10.3-5
ifupdown2: 3.2.0-1+pmx8
ksm-control-daemon: 1.5-1
libjs-extjs: 7.0.0-4
libknet1: 1.28-pve1
libproxmox-acme-perl: 1.5.1
libproxmox-backup-qemu0: 1.4.1
libproxmox-rs-perl: 0.3.3
libpve-access-control: 8.1.4
libpve-apiclient-perl: 3.3.2
libpve-cluster-api-perl: 8.0.7
libpve-cluster-perl: 8.0.7
libpve-common-perl: 8.2.1
libpve-guest-common-perl: 5.1.3
libpve-http-server-perl: 5.1.0
libpve-network-perl: 0.9.8
libpve-rs-perl: 0.8.9
libpve-storage-perl: 8.2.3
libspice-server1: 0.15.1-1
lvm2: 2.03.16-2
lxc-pve: 6.0.0-1
lxcfs: 6.0.0-pve2
novnc-pve: 1.4.0-3
proxmox-backup-client: 3.2.7-1
proxmox-backup-file-restore: 3.2.7-1
proxmox-firewall: 0.4.2
proxmox-kernel-helper: 8.1.0
proxmox-mail-forward: 0.2.3
proxmox-mini-journalreader: 1.4.0
proxmox-offline-mirror-helper: 0.6.6
proxmox-widget-toolkit: 4.2.3
pve-cluster: 8.0.7
pve-container: 5.1.12
pve-docs: 8.2.2
pve-edk2-firmware: 4.2023.08-4
pve-esxi-import-tools: 0.7.1
pve-firewall: 5.0.7
pve-firmware: 3.12-1
pve-ha-manager: 4.0.5
pve-i18n: 3.2.2
pve-qemu-kvm: 9.0.0-5
pve-xtermjs: 5.3.0-3
qemu-server: 8.2.1
smartmontools: 7.3-pve1
spiceterm: 3.3.0
swtpm: 0.8.0+pve1
vncterm: 1.8.0
zfsutils-linux: 2.2.4-pve1

Why can't the broken CT container access my network?

(Sorry if i dumped to much information, i have no idea what would be of use)
 
I managed to do a tcpdump on the host while doing a telnet on port 443
When doing it on the broken container
Code:
tcpdump -ni any host 192.168.20.158 and host 192.168.20.1 and tcp
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
21:40:59.037739 veth100i0 P   IP 192.168.20.158.40006 > 192.168.20.1.443: Flags [S], seq 266915349, win 32120, options [mss 1460,sackOK,TS val 703868374 ecr 0,nop,wscale 7], length 0
21:40:59.037749 enp6s0.20 Out IP 192.168.20.158.40006 > 192.168.20.1.443: Flags [S], seq 266915349, win 32120, options [mss 1460,sackOK,TS val 703868374 ecr 0,nop,wscale 7], length 0
21:40:59.037755 enp6s0 Out IP 192.168.20.158.40006 > 192.168.20.1.443: Flags [S], seq 266915349, win 32120, options [mss 1460,sackOK,TS val 703868374 ecr 0,nop,wscale 7], length 0
^C
3 packets captured
5 packets received by filter
0 packets dropped by kernel
When doing it on the working container
Code:
tcpdump -ni any host 192.168.20.157 and host 192.168.20.1 and tcp
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
21:42:20.269200 veth210i0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [S], seq 3151519466, win 32120, options [mss 1460,sackOK,TS val 2329061764 ecr 0,nop,wscale 7], length 0
21:42:20.269203 fwln210i0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [S], seq 3151519466, win 32120, options [mss 1460,sackOK,TS val 2329061764 ecr 0,nop,wscale 7], length 0
21:42:20.269204 fwpr210p0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [S], seq 3151519466, win 32120, options [mss 1460,sackOK,TS val 2329061764 ecr 0,nop,wscale 7], length 0
21:42:20.269206 enp6s0.20 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [S], seq 3151519466, win 32120, options [mss 1460,sackOK,TS val 2329061764 ecr 0,nop,wscale 7], length 0
21:42:20.269207 enp6s0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [S], seq 3151519466, win 32120, options [mss 1460,sackOK,TS val 2329061764 ecr 0,nop,wscale 7], length 0
21:42:20.269338 enp6s0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [S.], seq 1390665641, ack 3151519467, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2294141907 ecr 2329061764], length 0
21:42:20.269338 enp6s0.20 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [S.], seq 1390665641, ack 3151519467, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2294141907 ecr 2329061764], length 0
21:42:20.269342 fwpr210p0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [S.], seq 1390665641, ack 3151519467, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2294141907 ecr 2329061764], length 0
21:42:20.269343 fwln210i0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [S.], seq 1390665641, ack 3151519467, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2294141907 ecr 2329061764], length 0
21:42:20.269345 veth210i0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [S.], seq 1390665641, ack 3151519467, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2294141907 ecr 2329061764], length 0
21:42:20.269361 veth210i0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [.], ack 1, win 251, options [nop,nop,TS val 2329061764 ecr 2294141907], length 0
21:42:20.269362 fwln210i0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [.], ack 1, win 251, options [nop,nop,TS val 2329061764 ecr 2294141907], length 0
21:42:20.269362 fwpr210p0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [.], ack 1, win 251, options [nop,nop,TS val 2329061764 ecr 2294141907], length 0
21:42:20.269363 enp6s0.20 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [.], ack 1, win 251, options [nop,nop,TS val 2329061764 ecr 2294141907], length 0
21:42:20.269364 enp6s0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [.], ack 1, win 251, options [nop,nop,TS val 2329061764 ecr 2294141907], length 0
21:42:22.200329 veth210i0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [P.], seq 1:6, ack 1, win 251, options [nop,nop,TS val 2329063695 ecr 2294141907], length 5
21:42:22.200339 fwln210i0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [P.], seq 1:6, ack 1, win 251, options [nop,nop,TS val 2329063695 ecr 2294141907], length 5
21:42:22.200344 fwpr210p0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [P.], seq 1:6, ack 1, win 251, options [nop,nop,TS val 2329063695 ecr 2294141907], length 5
21:42:22.200349 enp6s0.20 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [P.], seq 1:6, ack 1, win 251, options [nop,nop,TS val 2329063695 ecr 2294141907], length 5
21:42:22.200354 enp6s0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [P.], seq 1:6, ack 1, win 251, options [nop,nop,TS val 2329063695 ecr 2294141907], length 5
21:42:22.200479 enp6s0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200479 enp6s0.20 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200490 fwpr210p0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200493 fwln210i0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200499 veth210i0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200665 enp6s0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [F.], seq 1, ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200665 enp6s0.20 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [F.], seq 1, ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200675 fwpr210p0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [F.], seq 1, ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200685 fwln210i0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [F.], seq 1, ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200704 veth210i0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [F.], seq 1, ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200831 veth210i0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [F.], seq 6, ack 2, win 251, options [nop,nop,TS val 2329063696 ecr 2294143838], length 0
21:42:22.200838 fwln210i0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [F.], seq 6, ack 2, win 251, options [nop,nop,TS val 2329063696 ecr 2294143838], length 0
21:42:22.200843 fwpr210p0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [F.], seq 6, ack 2, win 251, options [nop,nop,TS val 2329063696 ecr 2294143838], length 0
21:42:22.200847 enp6s0.20 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [F.], seq 6, ack 2, win 251, options [nop,nop,TS val 2329063696 ecr 2294143838], length 0
21:42:22.200852 enp6s0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [F.], seq 6, ack 2, win 251, options [nop,nop,TS val 2329063696 ecr 2294143838], length 0
21:42:22.200986 enp6s0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 7, win 513, options [nop,nop,TS val 2294143838 ecr 2329063696], length 0
21:42:22.200986 enp6s0.20 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 7, win 513, options [nop,nop,TS val 2294143838 ecr 2329063696], length 0
21:42:22.200996 fwpr210p0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 7, win 513, options [nop,nop,TS val 2294143838 ecr 2329063696], length 0
21:42:22.200999 fwln210i0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 7, win 513, options [nop,nop,TS val 2294143838 ecr 2329063696], length 0
21:42:22.201004 veth210i0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 7, win 513, options [nop,nop,TS val 2294143838 ecr 2329063696], length 0
^C
40 packets captured
44 packets received by filter
0 packets dropped by kernel

One more on the broken but with verbose enabled
Code:
tcpdump -ni any host 192.168.20.158 and host 192.168.20.1 and tcp -v
tcpdump: data link type LINUX_SLL2
tcpdump: listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
21:44:34.590206 veth100i0 P   IP (tos 0x0, ttl 64, id 26927, offset 0, flags [DF], proto TCP (6), length 60)
    192.168.20.158.41308 > 192.168.20.1.443: Flags [S], cksum 0xaa1e (incorrect -> 0x749d), seq 3362103021, win 32120, options [mss 1460,sackOK,TS val 704083864 ecr 0,nop,wscale 7], length 0
21:44:34.590210 enp6s0.20 Out IP (tos 0x0, ttl 64, id 26927, offset 0, flags [DF], proto TCP (6), length 60)
    192.168.20.158.41308 > 192.168.20.1.443: Flags [S], cksum 0xaa1e (incorrect -> 0x749d), seq 3362103021, win 32120, options [mss 1460,sackOK,TS val 704083864 ecr 0,nop,wscale 7], length 0
21:44:34.590214 enp6s0 Out IP (tos 0x0, ttl 64, id 26927, offset 0, flags [DF], proto TCP (6), length 60)
    192.168.20.158.41308 > 192.168.20.1.443: Flags [S], cksum 0xaa1e (incorrect -> 0x749d), seq 3362103021, win 32120, options [mss 1460,sackOK,TS val 704083864 ecr 0,nop,wscale 7], length 0
It looks like the checksum is invalid or am i reading this incorrect?
 
Last edited:

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!