RST
Fri, 02 May 2014 00:09:28 +0200 last edited: Fri, 02 May 2014 00:42:33 +0200
A LOG before the final REJECT in my ip6tables INPUT chain produces quite a lot of these logged packages
wasted quite some time now to find out why they appear, but just found what is not the cause of this. They only appear with #IPv6 connections. Wondering why none of the generated default firewall rules by CentOS or OpenSUSE seem to accept these RST packets. As far as I understand it is a valid packet.
TC=0 HOPLIMIT=54 FLOWLBL=0 PROTO=TCP SPT=[SOMEHIGHPORT] DPT=443 WINDOW=0 RES=0x00 RST URGP=0
wasted quite some time now to find out why they appear, but just found what is not the cause of this. They only appear with #IPv6 connections. Wondering why none of the generated default firewall rules by CentOS or OpenSUSE seem to accept these RST packets. As far as I understand it is a valid packet.
This website is tracked using the Piwik analytics tool. If you do not want that your visits are logged this way you can set a cookie to prevent Piwik from tracking further visits of the site (opt-out).