https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=283380
--- Comment #4 from Joerg Goltermann <j...@osn.de> --- (In reply to Zhenlei Huang from comment #3) Unfortunately, this doesn't solve our issue. Promiscuous mode is not enabled during normal operation. The reason we filed the report was that we received a message from the NOC of a major peering exchange informing us about this problem. They found duplicate IP packets with our MAC address on their peering network. # tcpdump --no-promiscuous-mode -netttti vtnet2 host 146.185.xx.yy tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on vtnet2, link-type EN10MB (Ethernet), snapshot length 262144 bytes 2024-12-18 07:10:31.949435 fc:0a:81:xx:yy:zz > 48:f8:db:xx:yy:zz, ethertype IPv4 (0x0800), length 66: 146.185.xx:yy.22067 > 185.23.xx.yy.33824: Flags [.], ack 746869960, win 501, options [nop,nop,TS val 2879849874 ecr 4251392697], length 0 2024-12-18 07:10:31.949443 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype IPv4 (0x0800), length 66: 146.185.xx:yy.22067 > 185.23.xx:yy.33824: Flags [.], ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 4251392697], length 0 2024-12-18 07:10:31.949529 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype IPv4 (0x0800), length 66: 146.185.xx:yy.22067 > 185.23.xx:yy.33824: Flags [.], ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 4251392697], length 0 2024-12-18 07:10:31.949601 fc:0a:81:xx:yy:zz > 48:f8:db:xx:yy:zz, ethertype IPv4 (0x0800), length 96: 146.185.xx:yy.22067 > 185.23.xx:yy.37220: Flags [P.], seq 1919842898:1919842928, ack 2070174457, win 501, options [nop,nop,TS val 2879849874 ecr 1086851336], length 30 2024-12-18 07:10:31.949605 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype IPv4 (0x0800), length 96: 146.185.xx:yy.22067 > 185.23.xx:yy.37220: Flags [P.], seq 0:30, ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 1086851336], length 30 2024-12-18 07:10:31.949702 bc:24:11:xx:yy:zz > 20:50:0f:xx:yy:zz, ethertype IPv4 (0x0800), length 96: 146.185.xx:yy.22067 > 185.23.xx:yy.37220: Flags [P.], seq 0:30, ack 1, win 501, options [nop,nop,TS val 2879849874 ecr 1086851336], length 30 interface state during the run of the tcpdump: # ifconfig vtnet2 | grep flags vtnet2: flags=1008843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST,LOWER_UP> metric 0 mtu 1500 # -- You are receiving this mail because: You are the assignee for the bug.