> It would be useful to disable IPv6 for this connection and try again. So applied the command proposed by Ed as root: $ echo 1 > /proc/sys/net/ipv6/conf/(name of interface)/disable_ipv6 and now I never have any error, the page always shows in firefox, konqueror or chrome. Also openssl s_client -connect docs.python.org:443 seems to always succeed (attached is the output of tcpdump). In your opinion, is this an issue with fedora or with my ISP (which is OVH)? Frédéric
tcpdump: listening on enp62s0u1u4, link-type EN10MB (Ethernet), capture size 262144 bytes 08:01:50.489389 IP (tos 0x0, ttl 64, id 9205, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.79.53260 > 151.101.36.223.443: Flags [S], cksum 0x7e6a (incorrect -> 0x8d25), seq 4080566988, win 29200, options [mss 1460,sackOK,TS val 1875972848 ecr 0,nop,wscale 7], length 0 08:01:50.536534 IP (tos 0x0, ttl 57, id 0, offset 0, flags [DF], proto TCP (6), length 60) 151.101.36.223.443 > 192.168.1.79.53260: Flags [S.], cksum 0x106b (correct), seq 1649336775, ack 4080566989, win 27360, options [mss 1380,sackOK,TS val 3222175746 ecr 1875972848,nop,wscale 9], length 0 08:01:50.536599 IP (tos 0x0, ttl 64, id 9206, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.79.53260 > 151.101.36.223.443: Flags [.], cksum 0x7e62 (incorrect -> 0xa8b4), seq 1, ack 1, win 229, options [nop,nop,TS val 1875972896 ecr 3222175746], length 0 08:01:50.587023 IP (tos 0x0, ttl 64, id 9207, offset 0, flags [DF], proto TCP (6), length 253) 192.168.1.79.53260 > 151.101.36.223.443: Flags [P.], cksum 0x7f2b (incorrect -> 0x2527), seq 1:202, ack 1, win 229, options [nop,nop,TS val 1875972946 ecr 3222175746], length 201 08:01:50.637936 IP (tos 0x0, ttl 57, id 25042, offset 0, flags [DF], proto TCP (6), length 1420) 151.101.36.223.443 > 192.168.1.79.53260: Flags [.], cksum 0x478f (correct), seq 1:1369, ack 202, win 56, options [nop,nop,TS val 3222175771 ecr 1875972946], length 1368 08:01:50.638064 IP (tos 0x0, ttl 64, id 9208, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.79.53260 > 151.101.36.223.443: Flags [.], cksum 0x7e62 (incorrect -> 0xa1ff), seq 202, ack 1369, win 251, options [nop,nop,TS val 1875972997 ecr 3222175771], length 0 08:01:50.638977 IP (tos 0x0, ttl 57, id 25043, offset 0, flags [DF], proto TCP (6), length 1420) 151.101.36.223.443 > 192.168.1.79.53260: Flags [.], cksum 0x2784 (correct), seq 1369:2737, ack 202, win 56, options [nop,nop,TS val 3222175771 ecr 1875972946], length 1368 08:01:50.639044 IP (tos 0x0, ttl 64, id 9209, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.79.53260 > 151.101.36.223.443: Flags [.], cksum 0x7e62 (incorrect -> 0x9c8f), seq 202, ack 2737, win 274, options [nop,nop,TS val 1875972998 ecr 3222175771], length 0 08:01:50.640141 IP (tos 0x0, ttl 57, id 25044, offset 0, flags [DF], proto TCP (6), length 1104) 151.101.36.223.443 > 192.168.1.79.53260: Flags [P.], cksum 0x4de6 (correct), seq 2737:3789, ack 202, win 56, options [nop,nop,TS val 3222175771 ecr 1875972946], length 1052 08:01:50.640206 IP (tos 0x0, ttl 64, id 9210, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.79.53260 > 151.101.36.223.443: Flags [.], cksum 0x7e62 (incorrect -> 0x985c), seq 202, ack 3789, win 296, options [nop,nop,TS val 1875972999 ecr 3222175771], length 0 08:01:50.641753 IP (tos 0x0, ttl 64, id 9211, offset 0, flags [DF], proto TCP (6), length 178) 192.168.1.79.53260 > 151.101.36.223.443: Flags [P.], cksum 0x7ee0 (incorrect -> 0x542f), seq 202:328, ack 3789, win 296, options [nop,nop,TS val 1875973001 ecr 3222175771], length 126 08:01:50.688839 IP (tos 0x0, ttl 57, id 25045, offset 0, flags [DF], proto TCP (6), length 278) 151.101.36.223.443 > 192.168.1.79.53260: Flags [P.], cksum 0x2536 (correct), seq 3789:4015, ack 328, win 56, options [nop,nop,TS val 3222175784 ecr 1875973001], length 226 08:01:50.729683 IP (tos 0x0, ttl 64, id 9212, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.79.53260 > 151.101.36.223.443: Flags [.], cksum 0x7e62 (incorrect -> 0x967f), seq 328, ack 4015, win 318, options [nop,nop,TS val 1875973089 ecr 3222175784], length 0 13 packets captured 13 packets received by filter 0 packets dropped by kernel
_______________________________________________ users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx