On Tue, Jan 19, 2016 at 11:51 AM, Bjørn Mork <[email protected]> wrote:
>> On Mon, Jan 18, 2016 at 10:15 PM, Glenn Washburn
>> <[email protected]> wrote:
>>> "curl -v --interface wwan0 http://www.google.com";
>>
>> You're binding the request to the wwan interface, which I assume it's
>> because it isn't the default route.
>>
>> Try to disable the reverse path filtering, something like:
>> # for i in /proc/sys/net/ipv4/conf/*/rp_filter ; do echo 0 > $i; done
>
> Nice catch! Personally I like to leave rp filtering to my ISP, blindly
> accepting anything they let through :)
>
> But I still do not understand how those synack's could pass the filter?

You mean because they could be seen in the tcpdump? IIRC the rp-filter
happens afterwards, although I'm not 100% sure; this is a long time
ago I faced it myself when doing multiplexing of communications over
multiple wwans.

-- 
Aleksander
https://aleksander.es
_______________________________________________
ModemManager-devel mailing list
[email protected]
http://lists.freedesktop.org/mailman/listinfo/modemmanager-devel

Reply via email to