We recently recognized that tcp packets from the private docker network being routed to external addresses. This is irritating to us. How can this be explained and avoided?
root@mail:/opt/mailcow-dockerized # tcpdump -n net 172.22.1.0/24 -i eth0
dropped privs to tcpdump
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
20:39:50.734995 IP 172.22.1.250.imap > 37.24.xxx.xxx.20631: Flags [R], seq 128516594, win 0, length 0
20:39:50.735015 IP 172.22.1.250.imap > 37.24.xxx.xxx.20631: Flags [R], seq 128516594, win 0, length 0
21:10:24.470528 IP 172.22.1.250.imap > 37.24.xxx.xxx.9917: Flags [R], seq 3298072508, win 0, length 0
21:10:24.470596 IP 172.22.1.250.imap > 37.24.xxx.xxx.ndl-tcp-ois-gw: Flags [R], seq 3847556523, win 0, length 0
21:10:24.470619 IP 172.22.1.250.imap > 37.24.xxx.xxx.9917: Flags [R], seq 3298072508, win 0, length 0
21:10:24.470637 IP 172.22.1.250.imap > 37.24.xxx.xxx.ndl-tcp-ois-gw: Flags [R], seq 3847556523, win 0, length 0
Masquerading is active according to attached output of nft list ruleset
.