newt failed to read ICMP packet #48

Open
opened 2025-11-19 07:12:50 -06:00 by GiteaMirror · 1 comment
Owner

Originally created by @Aliang-code on GitHub (Aug 21, 2025).

After the earliest successful deployment and connection to newt, I can never succeed again.
I absolutely opened the ports known in all the documentation, here is newt log and tcpdump on vps pangolin server:

INFO: 2025/08/21 15:33:49 Newt version 1.4.1
DEBUG: 2025/08/21 15:33:50 Endpoint: https://***
DEBUG: 2025/08/21 15:33:50 Log Level: debug
DEBUG: 2025/08/21 15:33:50 Docker Network Validation Enabled: false
DEBUG: 2025/08/21 15:33:50 TLS Private Key Set: false
DEBUG: 2025/08/21 15:33:50 Dns: 8.8.8.8
DEBUG: 2025/08/21 15:33:50 MTU: 1280
DEBUG: 2025/08/21 15:33:50 Received token: ***
DEBUG: 2025/08/21 15:33:51 Public key:***
INFO: 2025/08/21 15:33:51 Websocket connected
INFO: 2025/08/21 15:33:51 Requesting exit nodes from server
DEBUG: 2025/08/21 15:33:51 Sending message: newt/wg/register, data: map[backwardsCompatible:true newtVersion:1.4.1 publicKey:***]
DEBUG: 2025/08/21 15:33:51 Sending message: newt/ping/request, data: map[]
INFO: 2025/08/21 15:33:51 Received ping message
DEBUG: 2025/08/21 15:33:51 Only one exit node available, using it directly: ***
DEBUG: 2025/08/21 15:33:51 Sending message: newt/wg/register, data: map[newtVersion:1.4.1 pingResults:[{ExitNodeID:1 LatencyMs:0 Weight:1 Error: Name:Exit Node SKW27i9h Endpoint:*** WasPreviouslyConnected:true}] publicKey:***]
INFO: 2025/08/21 15:33:51 Received registration message
DEBUG: 2025/08/21 15:33:51 Received: {Type:newt/wg/connect Data:map[endpoint:***:51820 publicKey:*** serverIP:100.89.128.1 targets:map[tcp:[] udp:[]] tunnelIP:100.89.128.4]}
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 2 - started
INFO: 2025/08/21 15:33:51 Connecting to endpoint: ***
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 1 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 3 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 3 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: TUN reader - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 12 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 4 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 9 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 1 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 12 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 11 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 10 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 11 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 2 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 11 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 12 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 3 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 4 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 9 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 2 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 5 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 5 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 7 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 9 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 4 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 6 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 5 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 6 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 7 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 10 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 8 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 6 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 7 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 10 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 8 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 8 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: event worker - started
DEBUG: wireguard: 2025/08/21 15:33:51 Interface up requested
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 1 - started
DEBUG: wireguard: 2025/08/21 15:33:51 UDP bind has been updated
DEBUG: wireguard: 2025/08/21 15:33:51 Interface state was Down, requested Up, now Up
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: receive incoming v6 - started
DEBUG: wireguard: 2025/08/21 15:33:51 Routine: receive incoming v4 - started
DEBUG: wireguard: 2025/08/21 15:33:51 UAPI: Updating private key
DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - UAPI: Created
DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - UAPI: Adding allowedip
DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - UAPI: Updating endpoint
DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - UAPI: Updating persistent keepalive interval
DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - Starting
DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - Routine: sequential receiver - started
DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - Sending keepalive packet
DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - Sending handshake initiation
DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - Routine: sequential sender - started
DEBUG: 2025/08/21 15:33:51 WireGuard device created. Lets ping the server now...
DEBUG: 2025/08/21 15:33:51 Testing initial connection with reliable ping...
DEBUG: 2025/08/21 15:33:51 Pinging 100.89.128.1
DEBUG: wireguard: 2025/08/21 15:33:56 peer(SKW2…iMmw) - Sending handshake initiation
DEBUG: 2025/08/21 15:33:56 Ping attempt 1/5 failed: failed to read ICMP packet: i/o timeout
DEBUG: 2025/08/21 15:33:56 Pinging 100.89.128.1
DEBUG: wireguard: 2025/08/21 15:34:01 peer(SKW2…iMmw) - Sending handshake initiation
DEBUG: 2025/08/21 15:34:02 Ping attempt 2/5 failed: failed to read ICMP packet: i/o timeout
DEBUG: 2025/08/21 15:34:02 Pinging 100.89.128.1
DEBUG: wireguard: 2025/08/21 15:34:06 peer(SKW2…iMmw) - Sending handshake initiation
DEBUG: 2025/08/21 15:34:08 Ping attempt 3/5 failed: failed to read ICMP packet: i/o timeout

server tcpdump

tcpdump -i any -n udp port 51820
tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
15:33:51.715216 eth0  In  IP 115.***.45705 > 154.***.51820: UDP, length 148
15:33:51.715256 br-f1db2ce3ba6b Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148
15:33:51.715262 veth7c763e0 Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148
15:33:51.715498 veth7c763e0 P   IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92
15:33:51.715501 br-f1db2ce3ba6b In  IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92
15:33:51.715512 eth0  Out IP 154.***.51820 > 115.***.45705: UDP, length 92
15:33:56.716235 eth0  In  IP 115.***.45705 > 154.***.51820: UDP, length 148
15:33:56.716268 br-f1db2ce3ba6b Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148
15:33:56.716275 veth7c763e0 Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148
15:33:56.716494 veth7c763e0 P   IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92
15:33:56.716497 br-f1db2ce3ba6b In  IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92
15:33:56.716510 eth0  Out IP 154.***.51820 > 115.***.45705: UDP, length 92
15:34:01.716976 eth0  In  IP 115.***.45705 > 154.***.51820: UDP, length 148
15:34:01.717061 br-f1db2ce3ba6b Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148
15:34:01.717074 veth7c763e0 Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148
15:34:01.717289 veth7c763e0 P   IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92
15:34:01.717292 br-f1db2ce3ba6b In  IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92
15:34:01.717303 eth0  Out IP 154.***.51820 > 115.***.45705: UDP, length 92
15:34:06.717282 eth0  In  IP 115.***.45705 > 154.***.51820: UDP, length 148
15:34:06.717316 br-f1db2ce3ba6b Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148
15:34:06.717323 veth7c763e0 Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148
15:34:06.717550 veth7c763e0 P   IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92
15:34:06.717553 br-f1db2ce3ba6b In  IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92
15:34:06.717564 eth0  Out IP 154.***.51820 > 115.***.45705: UDP, length 92

Currently I doubt whether the operator has blocked some places, Hope to get some help

Originally created by @Aliang-code on GitHub (Aug 21, 2025). After the earliest successful deployment and connection to newt, I can never succeed again. I absolutely opened the ports known in all the documentation, here is newt log and tcpdump on vps pangolin server: ``` INFO: 2025/08/21 15:33:49 Newt version 1.4.1 DEBUG: 2025/08/21 15:33:50 Endpoint: https://*** DEBUG: 2025/08/21 15:33:50 Log Level: debug DEBUG: 2025/08/21 15:33:50 Docker Network Validation Enabled: false DEBUG: 2025/08/21 15:33:50 TLS Private Key Set: false DEBUG: 2025/08/21 15:33:50 Dns: 8.8.8.8 DEBUG: 2025/08/21 15:33:50 MTU: 1280 DEBUG: 2025/08/21 15:33:50 Received token: *** DEBUG: 2025/08/21 15:33:51 Public key:*** INFO: 2025/08/21 15:33:51 Websocket connected INFO: 2025/08/21 15:33:51 Requesting exit nodes from server DEBUG: 2025/08/21 15:33:51 Sending message: newt/wg/register, data: map[backwardsCompatible:true newtVersion:1.4.1 publicKey:***] DEBUG: 2025/08/21 15:33:51 Sending message: newt/ping/request, data: map[] INFO: 2025/08/21 15:33:51 Received ping message DEBUG: 2025/08/21 15:33:51 Only one exit node available, using it directly: *** DEBUG: 2025/08/21 15:33:51 Sending message: newt/wg/register, data: map[newtVersion:1.4.1 pingResults:[{ExitNodeID:1 LatencyMs:0 Weight:1 Error: Name:Exit Node SKW27i9h Endpoint:*** WasPreviouslyConnected:true}] publicKey:***] INFO: 2025/08/21 15:33:51 Received registration message DEBUG: 2025/08/21 15:33:51 Received: {Type:newt/wg/connect Data:map[endpoint:***:51820 publicKey:*** serverIP:100.89.128.1 targets:map[tcp:[] udp:[]] tunnelIP:100.89.128.4]} DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 2 - started INFO: 2025/08/21 15:33:51 Connecting to endpoint: *** DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 1 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 3 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 3 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: TUN reader - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 12 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 4 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 9 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 1 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 12 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 11 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 10 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 11 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 2 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 11 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 12 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 3 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 4 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 9 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 2 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 5 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 5 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 7 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 9 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 4 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 6 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 5 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 6 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 7 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 10 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: handshake worker 8 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 6 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 7 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 10 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: encryption worker 8 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 8 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: event worker - started DEBUG: wireguard: 2025/08/21 15:33:51 Interface up requested DEBUG: wireguard: 2025/08/21 15:33:51 Routine: decryption worker 1 - started DEBUG: wireguard: 2025/08/21 15:33:51 UDP bind has been updated DEBUG: wireguard: 2025/08/21 15:33:51 Interface state was Down, requested Up, now Up DEBUG: wireguard: 2025/08/21 15:33:51 Routine: receive incoming v6 - started DEBUG: wireguard: 2025/08/21 15:33:51 Routine: receive incoming v4 - started DEBUG: wireguard: 2025/08/21 15:33:51 UAPI: Updating private key DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - UAPI: Created DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - UAPI: Adding allowedip DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - UAPI: Updating endpoint DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - UAPI: Updating persistent keepalive interval DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - Starting DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - Routine: sequential receiver - started DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - Sending keepalive packet DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - Sending handshake initiation DEBUG: wireguard: 2025/08/21 15:33:51 peer(SKW2…iMmw) - Routine: sequential sender - started DEBUG: 2025/08/21 15:33:51 WireGuard device created. Lets ping the server now... DEBUG: 2025/08/21 15:33:51 Testing initial connection with reliable ping... DEBUG: 2025/08/21 15:33:51 Pinging 100.89.128.1 DEBUG: wireguard: 2025/08/21 15:33:56 peer(SKW2…iMmw) - Sending handshake initiation DEBUG: 2025/08/21 15:33:56 Ping attempt 1/5 failed: failed to read ICMP packet: i/o timeout DEBUG: 2025/08/21 15:33:56 Pinging 100.89.128.1 DEBUG: wireguard: 2025/08/21 15:34:01 peer(SKW2…iMmw) - Sending handshake initiation DEBUG: 2025/08/21 15:34:02 Ping attempt 2/5 failed: failed to read ICMP packet: i/o timeout DEBUG: 2025/08/21 15:34:02 Pinging 100.89.128.1 DEBUG: wireguard: 2025/08/21 15:34:06 peer(SKW2…iMmw) - Sending handshake initiation DEBUG: 2025/08/21 15:34:08 Ping attempt 3/5 failed: failed to read ICMP packet: i/o timeout ``` server tcpdump ``` tcpdump -i any -n udp port 51820 tcpdump: data link type LINUX_SLL2 tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes 15:33:51.715216 eth0 In IP 115.***.45705 > 154.***.51820: UDP, length 148 15:33:51.715256 br-f1db2ce3ba6b Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148 15:33:51.715262 veth7c763e0 Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148 15:33:51.715498 veth7c763e0 P IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92 15:33:51.715501 br-f1db2ce3ba6b In IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92 15:33:51.715512 eth0 Out IP 154.***.51820 > 115.***.45705: UDP, length 92 15:33:56.716235 eth0 In IP 115.***.45705 > 154.***.51820: UDP, length 148 15:33:56.716268 br-f1db2ce3ba6b Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148 15:33:56.716275 veth7c763e0 Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148 15:33:56.716494 veth7c763e0 P IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92 15:33:56.716497 br-f1db2ce3ba6b In IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92 15:33:56.716510 eth0 Out IP 154.***.51820 > 115.***.45705: UDP, length 92 15:34:01.716976 eth0 In IP 115.***.45705 > 154.***.51820: UDP, length 148 15:34:01.717061 br-f1db2ce3ba6b Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148 15:34:01.717074 veth7c763e0 Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148 15:34:01.717289 veth7c763e0 P IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92 15:34:01.717292 br-f1db2ce3ba6b In IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92 15:34:01.717303 eth0 Out IP 154.***.51820 > 115.***.45705: UDP, length 92 15:34:06.717282 eth0 In IP 115.***.45705 > 154.***.51820: UDP, length 148 15:34:06.717316 br-f1db2ce3ba6b Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148 15:34:06.717323 veth7c763e0 Out IP 115.***.45705 > 172.19.0.3.51820: UDP, length 148 15:34:06.717550 veth7c763e0 P IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92 15:34:06.717553 br-f1db2ce3ba6b In IP 172.19.0.3.51820 > 115.***.45705: UDP, length 92 15:34:06.717564 eth0 Out IP 154.***.51820 > 115.***.45705: UDP, length 92 ``` Currently I doubt whether the operator has blocked some places, Hope to get some help
Author
Owner

@Aliang-code commented on GitHub (Aug 21, 2025):

and here is tcpdump on my homelab:

tcpdump: data link type LINUX_SLL2
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
07:56:50.878029 eth0  Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148
07:56:55.879042 eth0  Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148
07:57:00.879907 eth0  Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148
07:57:05.880311 eth0  Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148
07:57:10.880979 eth0  Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148
07:57:15.881411 eth0  Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148
07:57:20.882362 eth0  Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148
07:57:25.883734 eth0  Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148
07:57:30.884557 eth0  Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148
07:57:35.885518 eth0  Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148

Obviously I can't receive a return package from vps

@Aliang-code commented on GitHub (Aug 21, 2025): and here is tcpdump on my homelab: ``` tcpdump: data link type LINUX_SLL2 tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes 07:56:50.878029 eth0 Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148 07:56:55.879042 eth0 Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148 07:57:00.879907 eth0 Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148 07:57:05.880311 eth0 Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148 07:57:10.880979 eth0 Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148 07:57:15.881411 eth0 Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148 07:57:20.882362 eth0 Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148 07:57:25.883734 eth0 Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148 07:57:30.884557 eth0 Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148 07:57:35.885518 eth0 Out IP 192.168.1.245.45705 > 154.***.51820: UDP, length 148 ``` Obviously I can't receive a return package from vps
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github-starred/newt#48