mat1
2
I’ve seen that:
The Handshake is sent to the destination address:
Client-Side
09:28:54.857415 IP client.49542 > server.51820: UDP, length 148
Server-Side:
09:31:24.161261 IP client.49542 > server.51820: UDP, length 148
09:31:24.175533 IP server.51820 > client.49542: UDP, length 92 [this is missing on the client-side....]
In this situation I’ve the correct entry in the conntrack module in the firewall of the client-side:
root@FIREWALL:~# conntrack -L | grep 49542
conntrack v0.9.14 (conntrack-tools): udp 17 26 src=192.168.2.122 dst=##server-ip## sport=49542 dport=51820 [UNREPLIED] src=##server-public-ip## dst=##client-public-ip## sport=51820 dport=49542 mark=1694498816 use=1
109 flow entries have been shown.
Also when flushing the Conntrack-Table on the Client-Side, it gets entered again:
conntrack v0.9.14 (conntrack-tools): 166 flow entries have been shown.
udp 17 29 src=192.168.2.122 dst=##server-public-ip## sport=49542 dport=51820 [UNREPLIED] src=##server-public-ip## dst=##client-public-ip## sport=51820 dport=49542 mark=1694498816 use=1
It’s really weird…