Don’t helps. Connection is hangs:
[dv@manjaro ~]$ sudo tcpdump -i lxdbr0 -nn host 10.0.5.68
[sudo] password for dv:
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on lxdbr0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
16:44:44.633247 IP 10.0.5.68.35994 > 10.0.5.1.53: 16626+ A? dl-cdn.alpinelinux.org. (40)
16:44:44.633266 IP 10.0.5.68.35994 > 10.0.5.1.53: 16840+ AAAA? dl-cdn.alpinelinux.org. (40)
16:44:44.916578 ARP, Request who-has 10.0.5.68 tell 10.0.5.1, length 28
16:44:44.916591 ARP, Reply 10.0.5.68 is-at 00:16:3e:2d:ef:89, length 28
16:44:44.916593 IP 10.0.5.1.53 > 10.0.5.68.35994: 16840 2/4/4 CNAME dualstack.d.sni.global.fastly.net., AAAA 2a04:4e42:14::645 (251)
16:44:45.010200 IP 10.0.5.1.53 > 10.0.5.68.35994: 16626 2/4/4 CNAME dualstack.d.sni.global.fastly.net., A 151.101.86.133 (239)
16:44:45.010471 IP 10.0.5.68.55806 > 151.101.86.133.443: Flags [S], seq 2130057972, win 64240, options [mss 1460,sackOK,TS val 25417229
18 ecr 0,nop,wscale 7], length 0
16:44:45.034687 IP 151.101.86.133.443 > 10.0.5.68.55806: Flags [S.], seq 3897295795, ack 2130057973, win 65535, options [mss 1460,sackO
K,TS val 3498623582 ecr 2541722918,nop,wscale 9], length 0
16:44:45.034707 IP 10.0.5.68.55806 > 151.101.86.133.443: Flags [.], ack 1, win 502, options [nop,nop,TS val 2541722943 ecr 3498623582],
length 0
16:44:45.045541 IP 10.0.5.68.55806 > 151.101.86.133.443: Flags [P.], seq 1:325, ack 1, win 502, options [nop,nop,TS val 2541722953 ecr
3498623582], length 324
16:44:45.069743 IP 151.101.86.133.443 > 10.0.5.68.55806: Flags [.], ack 325, win 285, options [nop,nop,TS val 3498623617 ecr 2541722953
], length 0
16:44:45.074388 IP 151.101.86.133.443 > 10.0.5.68.55806: Flags [P.], seq 4333:4429, ack 325, win 285, options [nop,nop,TS val 349862362
1 ecr 2541722953], length 96
16:44:45.074400 IP 10.0.5.68.55806 > 151.101.86.133.443: Flags [.], ack 1, win 502, options [nop,nop,TS val 2541722982 ecr 3498623617,n
op,nop,sack 1 {4333:4429}], length 0
For example:
[dv@manjaro ~]$ lxc exec jupyter -- wget -T20 https://hsto.org/r/w1560/webt/l8/3u/km/l83ukmshtxtanhyi4src9hmnqkm.png
Connecting to hsto.org (188.114.99.192:443)
saving to 'l83ukmshtxtanhyi4src9hmnqkm.png'
l83ukmshtxtanhyi4src 100% |***************************************************************************************| 19734 0:00:00 ETA
'l83ukmshtxtanhyi4src9hmnqkm.png' saved
[dv@manjaro ~]$ sudo tcpdump -i lxdbr0 -nn host 10.0.5.68
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on lxdbr0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
16:48:36.046851 IP 10.0.5.68.59919 > 10.0.5.1.53: 31083+ A? hsto.org. (26)
16:48:36.046872 IP 10.0.5.68.59919 > 10.0.5.1.53: 31253+ AAAA? hsto.org. (26)
16:48:36.046902 IP 10.0.5.1.53 > 10.0.5.68.59919: 31083 2/0/0 A 188.114.99.192, A 188.114.98.192 (58)
16:48:36.046923 IP 10.0.5.1.53 > 10.0.5.68.59919: 31253 2/0/0 AAAA 2a06:98c1:3122:c000::, AAAA 2a06:98c1:3123:c000:: (82)
16:48:36.047028 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [S], seq 3368761456, win 64240, options [mss 1460,sackOK,TS val 2871918000 ecr 0,nop,wscale 7], length 0
16:48:36.049368 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [S.], seq 250287147, ack 3368761457, win 64240, options [mss 1400,nop,nop,sackOK,nop,wscale 13], length 0
16:48:36.049386 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 1, win 502, length 0
16:48:36.059335 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [P.], seq 1:311, ack 1, win 502, length 310
16:48:36.061729 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], ack 311, win 8, length 0
16:48:36.087061 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 1461:2622, ack 311, win 8, length 1161
16:48:36.087072 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 1, win 502, options [nop,nop,sack 1 {1461:2622}], length 0
16:48:36.089060 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], seq 1:1453, ack 311, win 8, length 1452
16:48:36.089063 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 1453:2622, ack 311, win 8, length 1169
16:48:36.089073 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 1453, win 495, options [nop,nop,sack 1 {1461:2622}], length 0
16:48:36.089078 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 2622, win 496, options [nop,nop,sack 1 {1461:2622}], length 0
16:48:36.089840 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [P.], seq 311:391, ack 2622, win 501, length 80
16:48:36.094219 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], ack 391, win 8, length 0
16:48:36.094232 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [P.], seq 391:537, ack 2622, win 501, length 146
16:48:36.097386 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], ack 537, win 8, length 0
16:48:36.107038 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], seq 2622:4074, ack 537, win 8, length 1452
16:48:36.107041 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 4074:4463, ack 537, win 8, length 389
16:48:36.107075 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 4463, win 496, length 0
16:48:36.107289 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], seq 4463:5915, ack 537, win 8, length 1452
16:48:36.107293 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 5915:7245, ack 537, win 8, length 1330
16:48:36.107300 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 7245, win 496, length 0
16:48:36.107528 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 7245:8636, ack 537, win 8, length 1391
16:48:36.107532 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], seq 8636:10088, ack 537, win 8, length 1452
16:48:36.107539 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 10088, win 496, length 0
16:48:36.107790 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 10088:11418, ack 537, win 8, length 1330
16:48:36.107794 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 11418:12809, ack 537, win 8, length 1391
16:48:36.107800 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 12809, win 496, length 0
16:48:36.108039 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], seq 12809:14261, ack 537, win 8, length 1452
16:48:36.108043 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 14261:15591, ack 537, win 8, length 1330
16:48:36.108045 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], seq 15591:17043, ack 537, win 8, length 1452
16:48:36.108052 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 15591, win 496, length 0
16:48:36.108288 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 17043:18373, ack 537, win 8, length 1330
16:48:36.108291 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 18373:19764, ack 537, win 8, length 1391
16:48:36.108298 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 18373, win 501, length 0
16:48:36.108538 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], seq 19764:21216, ack 537, win 8, length 1452
16:48:36.108541 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 21216:22546, ack 537, win 8, length 1330
16:48:36.108548 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 21216, win 501, length 0
16:48:36.108789 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [P.], seq 22546:23828, ack 537, win 8, length 1282
16:48:36.108791 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [F.], seq 23828, ack 537, win 8, length 0
16:48:36.108799 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [.], ack 23828, win 501, length 0
16:48:36.109253 IP 10.0.5.68.50412 > 188.114.99.192.443: Flags [F.], seq 537, ack 23829, win 501, length 0
16:48:36.111943 IP 188.114.99.192.443 > 10.0.5.68.50412: Flags [.], ack 538, win 8, length 0
^C
46 packets captured
46 packets received by filter
0 packets dropped by kernel