CT container can't access network

Dec 13, 2021
24
6
8
Hi so i have one old CT container, that can access the network just fine
But when i create a new one it manages to get an IP but that is about it..

Working CTBroken CT
pct config 210
Code:
arch: amd64
cores: 4
features: nesting=1
hostname: emby
memory: 2048
mp0: /storage/movies,mp=/mnt/movies
mp1: /storage/series,mp=/mnt/series
mp2: /storage/emby,mp=/var/lib/emby
net0: name=eth0,bridge=vmbr0,firewall=1,hwaddr=26:07:EC:8E:2E:51,ip=dhcp,tag=20,type=veth
onboot: 0
ostype: debian
rootfs: storage:subvol-210-disk-0,size=32G
swap: 2048
unprivileged: 1
lxc.cgroup2.devices.allow: c 226:0 rwm
lxc.cgroup2.devices.allow: c 226:128 rwm
lxc.cgroup2.devices.allow: c 29:0 rwm
lxc.mount.entry: /dev/dri/card0 dev/dri/card0 none bind,optional,create=file
lxc.mount.entry: /dev/dri dev/dri none bind,optional,create=dir
lxc.mount.entry: /dev/dri/renderD128 dev/renderD128 none bind,optional,create=file
lxc.idmap: u 0 100000 44
lxc.idmap: g 0 100000 44
lxc.idmap: u 44 44 1
lxc.idmap: g 44 44 1
lxc.idmap: u 45 100045 60
lxc.idmap: g 45 100045 60
lxc.idmap: u 105 103 1
lxc.idmap: g 105 103 1
lxc.idmap: u 106 100106 892
lxc.idmap: g 106 100106 892
lxc.idmap: u 998 10210 1
lxc.idmap: g 998 10210 1
lxc.idmap: u 999 100999 64537
lxc.idmap: g 999 100999 64537
config (pct config 100)
Code:
arch: amd64
cores: 1
features: nesting=1
hostname: test
memory: 512
net0: name=eth0,bridge=vmbr0,hwaddr=BC:24:11:79:CA:FC,ip=dhcp,tag=20,type=veth
ostype: debian
rootfs: storage:subvol-100-disk-0,size=8G
swap: 512
unprivileged: 1
ip link
Code:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0@if14: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000
    link/ether 26:07:ec:8e:2e:51 brd ff:ff:ff:ff:ff:ff link-netnsid 0
ip link
Code:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0@if48: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000
    link/ether bc:24:11:79:ca:fc brd ff:ff:ff:ff:ff:ff link-netnsid 0
cat /etc/network/interfaces
Code:
auto lo
iface lo inet loopback

auto eth0
iface eth0 inet dhcp
cat /etc/network/interfaces
Code:
auto lo
iface lo inet loopback

auto eth0
iface eth0 inet dhcp
cat /etc/resolv.conf
Code:
domain localdomain
search localdomain
nameserver 192.168.20.1
cat /etc/resolv.conf
Code:
domain localdomain
search localdomain
nameserver 192.168.20.1
ip neighbor show
Code:
192.168.20.1 dev eth0 lladdr 00:e0:97:1c:b7:16 STALE
192.168.20.230 dev eth0 lladdr 46:4a:5e:3c:8a:49 STALE
ip neighbor show
Code:
192.168.20.1 dev eth0 FAILED
ip r
Code:
default via 192.168.20.1 dev eth0
192.168.20.0/24 dev eth0 proto kernel scope link src 192.168.20.157
ip r
Code:
default via 192.168.20.1 dev eth0
192.168.20.0/24 dev eth0 proto kernel scope link src 192.168.20.158
ip a
Code:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: eth0@if14: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    link/ether 26:07:ec:8e:2e:51 brd ff:ff:ff:ff:ff:ff link-netnsid 0
    inet 192.168.20.157/24 brd 192.168.20.255 scope global dynamic eth0
       valid_lft 6282sec preferred_lft 6282sec
    inet6 fe80::2407:ecff:fe8e:2e51/64 scope link
       valid_lft forever preferred_lft forever
ip a
Code:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host noprefixroute
       valid_lft forever preferred_lft forever
2: eth0@if48: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    link/ether bc:24:11:79:ca:fc brd ff:ff:ff:ff:ff:ff link-netnsid 0
    inet 192.168.20.158/24 brd 192.168.20.255 scope global dynamic eth0
       valid_lft 4796sec preferred_lft 4796sec
    inet6 fe80::be24:11ff:fe79:cafc/64 scope link
       valid_lft forever preferred_lft forever
ping 192.168.20.1
Code:
PING 192.168.20.1 (192.168.20.1) 56(84) bytes of data.
64 bytes from 192.168.20.1: icmp_seq=1 ttl=64 time=0.184 ms
64 bytes from 192.168.20.1: icmp_seq=2 ttl=64 time=0.161 ms
64 bytes from 192.168.20.1: icmp_seq=3 ttl=64 time=0.162 ms
^C
--- 192.168.20.1 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2036ms
rtt min/avg/max/mdev = 0.161/0.169/0.184/0.010 ms
ping 192.168.20.1
Code:
PING 192.168.20.1 (192.168.20.1) 56(84) bytes of data.
From 192.168.20.158 icmp_seq=1 Destination Host Unreachable
From 192.168.20.158 icmp_seq=2 Destination Host Unreachable
From 192.168.20.158 icmp_seq=3 Destination Host Unreachable
From 192.168.20.158 icmp_seq=4 Destination Host Unreachable
From 192.168.20.158 icmp_seq=5 Destination Host Unreachable
From 192.168.20.158 icmp_seq=6 Destination Host Unreachable
From 192.168.20.158 icmp_seq=7 Destination Host Unreachable
From 192.168.20.158 icmp_seq=8 Destination Host Unreachable
From 192.168.20.158 icmp_seq=9 Destination Host Unreachable
From 192.168.20.158 icmp_seq=10 Destination Host Unreachable
From 192.168.20.158 icmp_seq=11 Destination Host Unreachable
From 192.168.20.158 icmp_seq=12 Destination Host Unreachable
--- 192.168.20.1 ping statistics ---
13 packets transmitted, 0 received, +12 errors, 100% packet loss, time 12308ms
Ping from proxmox
ping 192.168.20.157
Code:
PING 192.168.20.157 (192.168.20.157) 56(84) bytes of data.
64 bytes from 192.168.20.157: icmp_seq=1 ttl=63 time=0.330 ms
64 bytes from 192.168.20.157: icmp_seq=2 ttl=63 time=0.230 ms
^C
--- 192.168.20.157 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1035ms
rtt min/avg/max/mdev = 0.230/0.280/0.330/0.050 ms
Ping from proxmox
ping 192.168.20.158
Code:
PING 192.168.20.158 (192.168.20.158) 56(84) bytes of data.
^C
--- 192.168.20.158 ping statistics ---
25 packets transmitted, 0 received, 100% packet loss, time 24552ms
ip route list
Code:
default via 192.168.20.1 dev eth0
192.168.20.0/24 dev eth0 proto kernel scope link src 192.168.20.157
ip route list
Code:
default via 192.168.20.1 dev eth0
192.168.20.0/24 dev eth0 proto kernel scope link src 192.168.20.158

The network configuration on proxmox
cat /etc/network/interfaces
Code:
# network interface settings; autogenerated
# Please do NOT modify this file directly, unless you know what
# you're doing.
#
# If you want to manage parts of the network configuration manually,
# please utilize the 'source' or 'source-directory' directives to do
# so.
# PVE will preserve these directives, but will NOT read its network
# configuration from sourced files, so do not attempt to move any of
# the PVE managed interfaces into external files!


auto lo
iface lo inet loopback


iface enp6s0 inet manual


iface enp0s31f6 inet manual


auto vmbr0
iface vmbr0 inet static
        address 192.168.98.160/24
        gateway 192.168.98.1
        bridge-ports enp6s0
        bridge-stp off
        bridge-fd 0

pveversion --verbose
Code:
proxmox-ve: 8.2.0 (running kernel: 6.8.8-2-pve)
pve-manager: 8.2.4 (running version: 8.2.4/faa83925c9641325)
proxmox-kernel-helper: 8.1.0
pve-kernel-5.15: 7.4-14
proxmox-kernel-6.8: 6.8.8-2
proxmox-kernel-6.8.8-2-pve-signed: 6.8.8-2
pve-kernel-5.15.158-1-pve: 5.15.158-1
pve-kernel-5.15.131-2-pve: 5.15.131-3
pve-kernel-5.15.30-2-pve: 5.15.30-3
ceph-fuse: 16.2.11+ds-2
corosync: 3.1.7-pve3
criu: 3.17.1-2
glusterfs-client: 10.3-5
ifupdown2: 3.2.0-1+pmx8
ksm-control-daemon: 1.5-1
libjs-extjs: 7.0.0-4
libknet1: 1.28-pve1
libproxmox-acme-perl: 1.5.1
libproxmox-backup-qemu0: 1.4.1
libproxmox-rs-perl: 0.3.3
libpve-access-control: 8.1.4
libpve-apiclient-perl: 3.3.2
libpve-cluster-api-perl: 8.0.7
libpve-cluster-perl: 8.0.7
libpve-common-perl: 8.2.1
libpve-guest-common-perl: 5.1.3
libpve-http-server-perl: 5.1.0
libpve-network-perl: 0.9.8
libpve-rs-perl: 0.8.9
libpve-storage-perl: 8.2.3
libspice-server1: 0.15.1-1
lvm2: 2.03.16-2
lxc-pve: 6.0.0-1
lxcfs: 6.0.0-pve2
novnc-pve: 1.4.0-3
proxmox-backup-client: 3.2.7-1
proxmox-backup-file-restore: 3.2.7-1
proxmox-firewall: 0.4.2
proxmox-kernel-helper: 8.1.0
proxmox-mail-forward: 0.2.3
proxmox-mini-journalreader: 1.4.0
proxmox-offline-mirror-helper: 0.6.6
proxmox-widget-toolkit: 4.2.3
pve-cluster: 8.0.7
pve-container: 5.1.12
pve-docs: 8.2.2
pve-edk2-firmware: 4.2023.08-4
pve-esxi-import-tools: 0.7.1
pve-firewall: 5.0.7
pve-firmware: 3.12-1
pve-ha-manager: 4.0.5
pve-i18n: 3.2.2
pve-qemu-kvm: 9.0.0-5
pve-xtermjs: 5.3.0-3
qemu-server: 8.2.1
smartmontools: 7.3-pve1
spiceterm: 3.3.0
swtpm: 0.8.0+pve1
vncterm: 1.8.0
zfsutils-linux: 2.2.4-pve1

Why can't the broken CT container access my network?

(Sorry if i dumped to much information, i have no idea what would be of use)
 
I managed to do a tcpdump on the host while doing a telnet on port 443
When doing it on the broken container
Code:
tcpdump -ni any host 192.168.20.158 and host 192.168.20.1 and tcp
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
21:40:59.037739 veth100i0 P   IP 192.168.20.158.40006 > 192.168.20.1.443: Flags [S], seq 266915349, win 32120, options [mss 1460,sackOK,TS val 703868374 ecr 0,nop,wscale 7], length 0
21:40:59.037749 enp6s0.20 Out IP 192.168.20.158.40006 > 192.168.20.1.443: Flags [S], seq 266915349, win 32120, options [mss 1460,sackOK,TS val 703868374 ecr 0,nop,wscale 7], length 0
21:40:59.037755 enp6s0 Out IP 192.168.20.158.40006 > 192.168.20.1.443: Flags [S], seq 266915349, win 32120, options [mss 1460,sackOK,TS val 703868374 ecr 0,nop,wscale 7], length 0
^C
3 packets captured
5 packets received by filter
0 packets dropped by kernel
When doing it on the working container
Code:
tcpdump -ni any host 192.168.20.157 and host 192.168.20.1 and tcp
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
21:42:20.269200 veth210i0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [S], seq 3151519466, win 32120, options [mss 1460,sackOK,TS val 2329061764 ecr 0,nop,wscale 7], length 0
21:42:20.269203 fwln210i0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [S], seq 3151519466, win 32120, options [mss 1460,sackOK,TS val 2329061764 ecr 0,nop,wscale 7], length 0
21:42:20.269204 fwpr210p0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [S], seq 3151519466, win 32120, options [mss 1460,sackOK,TS val 2329061764 ecr 0,nop,wscale 7], length 0
21:42:20.269206 enp6s0.20 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [S], seq 3151519466, win 32120, options [mss 1460,sackOK,TS val 2329061764 ecr 0,nop,wscale 7], length 0
21:42:20.269207 enp6s0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [S], seq 3151519466, win 32120, options [mss 1460,sackOK,TS val 2329061764 ecr 0,nop,wscale 7], length 0
21:42:20.269338 enp6s0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [S.], seq 1390665641, ack 3151519467, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2294141907 ecr 2329061764], length 0
21:42:20.269338 enp6s0.20 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [S.], seq 1390665641, ack 3151519467, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2294141907 ecr 2329061764], length 0
21:42:20.269342 fwpr210p0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [S.], seq 1390665641, ack 3151519467, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2294141907 ecr 2329061764], length 0
21:42:20.269343 fwln210i0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [S.], seq 1390665641, ack 3151519467, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2294141907 ecr 2329061764], length 0
21:42:20.269345 veth210i0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [S.], seq 1390665641, ack 3151519467, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 2294141907 ecr 2329061764], length 0
21:42:20.269361 veth210i0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [.], ack 1, win 251, options [nop,nop,TS val 2329061764 ecr 2294141907], length 0
21:42:20.269362 fwln210i0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [.], ack 1, win 251, options [nop,nop,TS val 2329061764 ecr 2294141907], length 0
21:42:20.269362 fwpr210p0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [.], ack 1, win 251, options [nop,nop,TS val 2329061764 ecr 2294141907], length 0
21:42:20.269363 enp6s0.20 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [.], ack 1, win 251, options [nop,nop,TS val 2329061764 ecr 2294141907], length 0
21:42:20.269364 enp6s0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [.], ack 1, win 251, options [nop,nop,TS val 2329061764 ecr 2294141907], length 0
21:42:22.200329 veth210i0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [P.], seq 1:6, ack 1, win 251, options [nop,nop,TS val 2329063695 ecr 2294141907], length 5
21:42:22.200339 fwln210i0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [P.], seq 1:6, ack 1, win 251, options [nop,nop,TS val 2329063695 ecr 2294141907], length 5
21:42:22.200344 fwpr210p0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [P.], seq 1:6, ack 1, win 251, options [nop,nop,TS val 2329063695 ecr 2294141907], length 5
21:42:22.200349 enp6s0.20 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [P.], seq 1:6, ack 1, win 251, options [nop,nop,TS val 2329063695 ecr 2294141907], length 5
21:42:22.200354 enp6s0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [P.], seq 1:6, ack 1, win 251, options [nop,nop,TS val 2329063695 ecr 2294141907], length 5
21:42:22.200479 enp6s0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200479 enp6s0.20 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200490 fwpr210p0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200493 fwln210i0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200499 veth210i0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200665 enp6s0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [F.], seq 1, ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200665 enp6s0.20 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [F.], seq 1, ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200675 fwpr210p0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [F.], seq 1, ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200685 fwln210i0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [F.], seq 1, ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200704 veth210i0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [F.], seq 1, ack 6, win 514, options [nop,nop,TS val 2294143838 ecr 2329063695], length 0
21:42:22.200831 veth210i0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [F.], seq 6, ack 2, win 251, options [nop,nop,TS val 2329063696 ecr 2294143838], length 0
21:42:22.200838 fwln210i0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [F.], seq 6, ack 2, win 251, options [nop,nop,TS val 2329063696 ecr 2294143838], length 0
21:42:22.200843 fwpr210p0 P   IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [F.], seq 6, ack 2, win 251, options [nop,nop,TS val 2329063696 ecr 2294143838], length 0
21:42:22.200847 enp6s0.20 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [F.], seq 6, ack 2, win 251, options [nop,nop,TS val 2329063696 ecr 2294143838], length 0
21:42:22.200852 enp6s0 Out IP 192.168.20.157.58476 > 192.168.20.1.443: Flags [F.], seq 6, ack 2, win 251, options [nop,nop,TS val 2329063696 ecr 2294143838], length 0
21:42:22.200986 enp6s0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 7, win 513, options [nop,nop,TS val 2294143838 ecr 2329063696], length 0
21:42:22.200986 enp6s0.20 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 7, win 513, options [nop,nop,TS val 2294143838 ecr 2329063696], length 0
21:42:22.200996 fwpr210p0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 7, win 513, options [nop,nop,TS val 2294143838 ecr 2329063696], length 0
21:42:22.200999 fwln210i0 P   IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 7, win 513, options [nop,nop,TS val 2294143838 ecr 2329063696], length 0
21:42:22.201004 veth210i0 Out IP 192.168.20.1.443 > 192.168.20.157.58476: Flags [.], ack 7, win 513, options [nop,nop,TS val 2294143838 ecr 2329063696], length 0
^C
40 packets captured
44 packets received by filter
0 packets dropped by kernel

One more on the broken but with verbose enabled
Code:
tcpdump -ni any host 192.168.20.158 and host 192.168.20.1 and tcp -v
tcpdump: data link type LINUX_SLL2
tcpdump: listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
21:44:34.590206 veth100i0 P   IP (tos 0x0, ttl 64, id 26927, offset 0, flags [DF], proto TCP (6), length 60)
    192.168.20.158.41308 > 192.168.20.1.443: Flags [S], cksum 0xaa1e (incorrect -> 0x749d), seq 3362103021, win 32120, options [mss 1460,sackOK,TS val 704083864 ecr 0,nop,wscale 7], length 0
21:44:34.590210 enp6s0.20 Out IP (tos 0x0, ttl 64, id 26927, offset 0, flags [DF], proto TCP (6), length 60)
    192.168.20.158.41308 > 192.168.20.1.443: Flags [S], cksum 0xaa1e (incorrect -> 0x749d), seq 3362103021, win 32120, options [mss 1460,sackOK,TS val 704083864 ecr 0,nop,wscale 7], length 0
21:44:34.590214 enp6s0 Out IP (tos 0x0, ttl 64, id 26927, offset 0, flags [DF], proto TCP (6), length 60)
    192.168.20.158.41308 > 192.168.20.1.443: Flags [S], cksum 0xaa1e (incorrect -> 0x749d), seq 3362103021, win 32120, options [mss 1460,sackOK,TS val 704083864 ecr 0,nop,wscale 7], length 0
It looks like the checksum is invalid or am i reading this incorrect?
 
Last edited: