Klaus

RST

 Fri, 02 May 2014 00:09:28 +0200 last edited: Fri, 02 May 2014 00:42:33 +0200  
A LOG before the final REJECT in my ip6tables INPUT chain produces quite a lot of these logged packages
TC=0 HOPLIMIT=54 FLOWLBL=0 PROTO=TCP SPT=[SOMEHIGHPORT] DPT=443 WINDOW=0 RES=0x00 RST URGP=0

wasted quite some time now to find out why they appear, but just found what is not the cause of this. They only appear with #IPv6 connections. Wondering why none of the generated default firewall rules by CentOS or OpenSUSE seem to accept these RST packets. As far as I understand it is a valid packet. o_O