On Tue, Jan 19, 2016 at 11:51 AM, Bjørn Mork <[email protected]> wrote: >> On Mon, Jan 18, 2016 at 10:15 PM, Glenn Washburn >> <[email protected]> wrote: >>> "curl -v --interface wwan0 http://www.google.com" >> >> You're binding the request to the wwan interface, which I assume it's >> because it isn't the default route. >> >> Try to disable the reverse path filtering, something like: >> # for i in /proc/sys/net/ipv4/conf/*/rp_filter ; do echo 0 > $i; done > > Nice catch! Personally I like to leave rp filtering to my ISP, blindly > accepting anything they let through :) > > But I still do not understand how those synack's could pass the filter?
You mean because they could be seen in the tcpdump? IIRC the rp-filter happens afterwards, although I'm not 100% sure; this is a long time ago I faced it myself when doing multiplexing of communications over multiple wwans. -- Aleksander https://aleksander.es _______________________________________________ ModemManager-devel mailing list [email protected] http://lists.freedesktop.org/mailman/listinfo/modemmanager-devel
