Failed Connection over Mobile (Cellular) Networks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Nikos,

Thanks for your (and Dan's) response.

On 13/07/2018 19:26, Nikos Mavrogiannopoulos wrote:
> On Thu, Jul 12, 2018 at 5:23 PM, Gareth Williams
> <gareth at garethwilliams.me.uk> wrote:
>> Hi,
>>
>> I've just installed and configured ocserv.  I'm using openconnect as a
>> client on two Windows 10 laptops.  If I attempt from, say, a hotel xDSL
>> network, I connect and am able to access my lab environment remotely.
>>
>> However, if I attempt to connect by tethering the laptops over a mobile
>> network, it fails with:
>>
>> SSL connection failure: Error in the pull function.
>>
>> I've tried connecting with gnutls-cli and this fails with:
>>
>> *** Fatal error: The TLS connection was non-properly terminated.
>> *** Handshake has failed: The TLS connection was non-properly terminated.
>>
>> If I use gnutls-cli-debug, it tells me that it it has to disable all SSL and
>> TLS before exiting with:
> That's interesting. Which version of gnutls is that
This is gnutls v3.5.8 on Debian 9 (and I've tried Raspbian too)
> and what do you
> see if you try to connect with gnutls-cli?

gnutls-cli --no-ca-verification vpn.my.domain.name:443
Processed 166 CA certificate(s).
Resolving 'vpn.my.domain.name:443'...
Connecting to '146.xxx.xxx.139:443'...
*** Fatal error: The TLS connection was non-properly terminated.
*** handshake has failed: The TLS connection was non-properly terminated.

> Do you have the capture of
> a failed openconnect session to send me?

All the following captures are over the mobile network.

This is a capture of traffic at the client (running openconnect):

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

No.???? Time?????????? Source Destination?????????? Protocol Length Info
 ???? 14 4.259292?????? 192.168.43.116??????? 146.xxx.xxx.139 TCP????? 
66???? 61667 ? 443 [SYN] Seq=773288135 Win=64240 Len=0 MSS=1460 WS=256 
SACK_PERM=1

Frame 14: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on 
interface 0
Ethernet II, Src: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e), Dst: 
MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2)
Internet Protocol Version 4, Src: 192.168.43.116, Dst: 146.xxx.xxx.139
Transmission Control Protocol, Src Port: 61667, Dst Port: 443, Seq: 
773288135, Len: 0
 ??? Source Port: 61667
 ??? Destination Port: 443
 ??? [Stream index: 1]
 ??? [TCP Segment Len: 0]
 ??? Sequence number: 773288135
 ??? Acknowledgment number: 0
 ??? 1000 .... = Header Length: 32 bytes (8)
 ??? Flags: 0x002 (SYN)
 ??? Window size value: 64240
 ??? [Calculated window size: 64240]
 ??? Checksum: 0xbf31 [unverified]
 ??? [Checksum Status: Unverified]
 ??? Urgent pointer: 0
 ??? Options: (12 bytes), Maximum segment size, No-Operation (NOP), 
Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 15 4.306515?????? 146.xxx.xxx.139?????? 192.168.43.116 TCP????? 
66???? 443 ? 61667 [SYN, ACK] Seq=688983551 Ack=773288136 Win=29200 
Len=0 MSS=1358 SACK_PERM=1 WS=64

Frame 15: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on 
interface 0
Ethernet II, Src: MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2), 
Dst: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e)
Internet Protocol Version 4, Src: 146.xxx.xxx.139, Dst: 192.168.43.116
Transmission Control Protocol, Src Port: 443, Dst Port: 61667, Seq: 
688983551, Ack: 773288136, Len: 0
 ??? Source Port: 443
 ??? Destination Port: 61667
 ??? [Stream index: 1]
 ??? [TCP Segment Len: 0]
 ??? Sequence number: 688983551
 ??? Acknowledgment number: 773288136
 ??? 1000 .... = Header Length: 32 bytes (8)
 ??? Flags: 0x012 (SYN, ACK)
 ??? Window size value: 29200
 ??? [Calculated window size: 29200]
 ??? Checksum: 0x1159 [unverified]
 ??? [Checksum Status: Unverified]
 ??? Urgent pointer: 0
 ??? Options: (12 bytes), Maximum segment size, No-Operation (NOP), 
No-Operation (NOP), SACK permitted, No-Operation (NOP), Window scale
 ??? [SEQ/ACK analysis]

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 16 4.306801?????? 192.168.43.116??????? 146.xxx.xxx.139 TCP????? 
54???? 61667 ? 443 [ACK] Seq=773288136 Ack=688983552 Win=66304 Len=0

Frame 16: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on 
interface 0
Ethernet II, Src: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e), Dst: 
MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2)
Internet Protocol Version 4, Src: 192.168.43.116, Dst: 146.xxx.xxx.139
Transmission Control Protocol, Src Port: 61667, Dst Port: 443, Seq: 
773288136, Ack: 688983552, Len: 0
 ??? Source Port: 61667
 ??? Destination Port: 443
 ??? [Stream index: 1]
 ??? [TCP Segment Len: 0]
 ??? Sequence number: 773288136
 ??? Acknowledgment number: 688983552
 ??? 0101 .... = Header Length: 20 bytes (5)
 ??? Flags: 0x010 (ACK)
 ??? Window size value: 259
 ??? [Calculated window size: 66304]
 ??? [Window size scaling factor: 256]
 ??? Checksum: 0xc2d1 [unverified]
 ??? [Checksum Status: Unverified]
 ??? Urgent pointer: 0
 ??? [SEQ/ACK analysis]

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 17 4.308578?????? 192.168.43.116??????? 146.xxx.xxx.139 TLSv1??? 
313??? Client Hello

Frame 17: 313 bytes on wire (2504 bits), 313 bytes captured (2504 bits) 
on interface 0
Ethernet II, Src: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e), Dst: 
MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2)
Internet Protocol Version 4, Src: 192.168.43.116, Dst: 146.xxx.xxx.139
Transmission Control Protocol, Src Port: 61667, Dst Port: 443, Seq: 
773288136, Ack: 688983552, Len: 259
 ??? Source Port: 61667
 ??? Destination Port: 443
 ??? [Stream index: 1]
 ??? [TCP Segment Len: 259]
 ??? Sequence number: 773288136
 ??? [Next sequence number: 773288395]
 ??? Acknowledgment number: 688983552
 ??? 0101 .... = Header Length: 20 bytes (5)
 ??? Flags: 0x018 (PSH, ACK)
 ??? Window size value: 259
 ??? [Calculated window size: 66304]
 ??? [Window size scaling factor: 256]
 ??? Checksum: 0xf790 [unverified]
 ??? [Checksum Status: Unverified]
 ??? Urgent pointer: 0
 ??? [SEQ/ACK analysis]
 ??? TCP payload (259 bytes)
Secure Sockets Layer

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 18 4.346466?????? 146.xxx.xxx.139?????? 192.168.43.116 TCP????? 
54???? 443 ? 61667 [RST, ACK] Seq=688983552 Ack=773288395 Win=2055680 Len=0

Frame 18: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on 
interface 0
Ethernet II, Src: MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2), 
Dst: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e)
Internet Protocol Version 4, Src: 146.xxx.xxx.139, Dst: 192.168.43.116
Transmission Control Protocol, Src Port: 443, Dst Port: 61667, Seq: 
688983552, Ack: 773288395, Len: 0
 ??? Source Port: 443
 ??? Destination Port: 61667
 ??? [Stream index: 1]
 ??? [TCP Segment Len: 0]
 ??? Sequence number: 688983552
 ??? Acknowledgment number: 773288395
 ??? 0101 .... = Header Length: 20 bytes (5)
 ??? Flags: 0x014 (RST, ACK)
 ??? Window size value: 32120
 ??? [Calculated window size: 2055680]
 ??? [Window size scaling factor: 64]
 ??? Checksum: 0x4555 [unverified]
 ??? [Checksum Status: Unverified]
 ??? Urgent pointer: 0
 ??? [SEQ/ACK analysis]

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

This is a capture at the server end for the above:

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

No.???? Time?????????? Source Destination?????????? Protocol Length Info
 ????? 1 0.000000?????? 92.xx.xxx.98????????? 172.28.2.20 TCP????? 
68???? 37074 ? 443 [SYN] Seq=773288135 Win=64240 Len=0 MSS=1358 WS=256 
SACK_PERM=1

Frame 1: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 92.xx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37074, Dst Port: 443, Seq: 
773288135, Len: 0
 ??? Source Port: 37074
 ??? Destination Port: 443
 ??? [Stream index: 0]
 ??? [TCP Segment Len: 0]
 ??? Sequence number: 773288135
 ??? Acknowledgment number: 0
 ??? 1000 .... = Header Length: 32 bytes (8)
 ??? Flags: 0x002 (SYN)
 ??? Window size value: 64240
 ??? [Calculated window size: 64240]
 ??? Checksum: 0x405e [unverified]
 ??? [Checksum Status: Unverified]
 ??? Urgent pointer: 0
 ??? Options: (12 bytes), Maximum segment size, No-Operation (NOP), 
Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 2 0.000187?????? 172.28.2.20?????????? 92.xx.xxx.98 TCP????? 
68???? 443 ? 37074 [SYN, ACK] Seq=688983551 Ack=773288136 Win=29200 
Len=0 MSS=1460 SACK_PERM=1 WS=64

Frame 2: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37074, Seq: 
688983551, Ack: 773288136, Len: 0
 ??? Source Port: 443
 ??? Destination Port: 37074
 ??? [Stream index: 0]
 ??? [TCP Segment Len: 0]
 ??? Sequence number: 688983551
 ??? Acknowledgment number: 773288136
 ??? 1000 .... = Header Length: 32 bytes (8)
 ??? Flags: 0x012 (SYN, ACK)
 ??? Window size value: 29200
 ??? [Calculated window size: 29200]
 ??? Checksum: 0x02e2 [unverified]
 ??? [Checksum Status: Unverified]
 ??? Urgent pointer: 0
 ??? Options: (12 bytes), Maximum segment size, No-Operation (NOP), 
No-Operation (NOP), SACK permitted, No-Operation (NOP), Window scale
 ??? [SEQ/ACK analysis]

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 3 0.049901?????? 92.xx.xxx.98????????? 172.28.2.20 TCP????? 
62???? 37074 ? 443 [ACK] Seq=773288136 Ack=688983552 Win=66304 Len=0

Frame 3: 62 bytes on wire (496 bits), 62 bytes captured (496 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 92.xx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37074, Dst Port: 443, Seq: 
773288136, Ack: 688983552, Len: 0
 ??? Source Port: 37074
 ??? Destination Port: 443
 ??? [Stream index: 0]
 ??? [TCP Segment Len: 0]
 ??? Sequence number: 773288136
 ??? Acknowledgment number: 688983552
 ??? 0101 .... = Header Length: 20 bytes (5)
 ??? Flags: 0x010 (ACK)
 ??? Window size value: 259
 ??? [Calculated window size: 66304]
 ??? [Window size scaling factor: 256]
 ??? Checksum: 0x4398 [unverified]
 ??? [Checksum Status: Unverified]
 ??? Urgent pointer: 0
 ??? [SEQ/ACK analysis]
VSS-Monitoring ethernet trailer, Source Port: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 4 0.059984?????? 92.xx.xxx.98????????? 172.28.2.20 TCP????? 
62???? 37074 ? 443 [RST, ACK] Seq=773288136 Ack=688983552 Win=8222720 Len=0

Frame 4: 62 bytes on wire (496 bits), 62 bytes captured (496 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 92.xx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37074, Dst Port: 443, Seq: 
773288136, Ack: 688983552, Len: 0
 ??? Source Port: 37074
 ??? Destination Port: 443
 ??? [Stream index: 0]
 ??? [TCP Segment Len: 0]
 ??? Sequence number: 773288136
 ??? Acknowledgment number: 688983552
 ??? 0101 .... = Header Length: 20 bytes (5)
 ??? Flags: 0x014 (RST, ACK)
 ??? Window size value: 32120
 ??? [Calculated window size: 8222720]
 ??? [Window size scaling factor: 256]
 ??? Checksum: 0xc71e [unverified]
 ??? [Checksum Status: Unverified]
 ??? Urgent pointer: 0
VSS-Monitoring ethernet trailer, Source Port: 0
--------------------------------------------------------------------------->8-----------------------------------------------------------------------

This is a capture at the server end, but this time when running gnutls-cli:

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

No.???? Time?????????? Source Destination?????????? Protocol Length Info
 ????? 1 0.000000?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
66???? 37206 ? 443 [SYN] Seq=4184378929 Win=64240 Len=0 MSS=1358 WS=256 
SACK_PERM=1

Frame 1: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37206, Dst Port: 443, Seq: 
4184378929, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 2 0.000185?????? 172.28.2.20 92.xxx.xxx.98????????? TCP????? 
66???? 443 ? 37206 [SYN, ACK] Seq=783771790 Ack=4184378930 Win=29200 
Len=0 MSS=1460 SACK_PERM=1 WS=64

Frame 2: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: 
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37206, Seq: 
783771790, Ack: 4184378930, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 3 0.048919?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
60???? 37206 ? 443 [ACK] Seq=4184378930 Ack=783771791 Win=66304 Len=0

Frame 3: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37206, Dst Port: 443, Seq: 
4184378930, Ack: 783771791, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 4 0.069010?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
60???? 37206 ? 443 [RST, ACK] Seq=4184378930 Ack=783771791 Win=8222720 Len=0

Frame 4: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37206, Dst Port: 443, Seq: 
4184378930, Ack: 783771791, Len: 0
--------------------------------------------------------------------------->8-----------------------------------------------------------------------

Finally, a capture at the server end, when successfully connecting using 
OpenSSL's s_client:

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

No.???? Time?????????? Source Destination?????????? Protocol Length Info
 ????? 1 0.000000?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
66???? 37213 ? 443 [SYN] Seq=1304591944 Win=64240 Len=0 MSS=1358 WS=256 
SACK_PERM=1

Frame 1: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 
1304591944, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 2 0.000175?????? 172.28.2.20 92.xxx.xxx.98????????? TCP????? 
66???? 443 ? 37213 [SYN, ACK] Seq=55774611 Ack=1304591945 Win=29200 
Len=0 MSS=1460 SACK_PERM=1 WS=64

Frame 2: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: 
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 
55774611, Ack: 1304591945, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 3 0.050807?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
60???? 37213 ? 443 [ACK] Seq=1304591945 Ack=55774612 Win=66304 Len=0

Frame 3: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 
1304591945, Ack: 55774612, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 4 0.059703?????? 92.xxx.xxx.98 172.28.2.20?????????? TLSv1.2? 
230??? Client Hello

Frame 4: 230 bytes on wire (1840 bits), 230 bytes captured (1840 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 
1304591945, Ack: 55774612, Len: 176
Secure Sockets Layer

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 5 0.059834?????? 172.28.2.20 92.xxx.xxx.98????????? TCP????? 
54???? 443 ? 37213 [ACK] Seq=55774612 Ack=1304592121 Win=30272 Len=0

Frame 5: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: 
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 
55774612, Ack: 1304592121, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 6 0.163836?????? 172.28.2.20 92.xxx.xxx.98????????? TLSv1.2? 
1412?? Server Hello

Frame 6: 1412 bytes on wire (11296 bits), 1412 bytes captured (11296 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: 
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 
55774612, Ack: 1304592121, Len: 1358
Secure Sockets Layer

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 7 0.164113?????? 172.28.2.20 92.xxx.xxx.98????????? TCP????? 
1412?? 443 ? 37213 [ACK] Seq=55775970 Ack=1304592121 Win=30272 Len=1358 
[TCP segment of a reassembled PDU]

Frame 7: 1412 bytes on wire (11296 bits), 1412 bytes captured (11296 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: 
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 
55775970, Ack: 1304592121, Len: 1358

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 8 0.164303?????? 172.28.2.20 92.xxx.xxx.98????????? TCP????? 
1412?? 443 ? 37213 [ACK] Seq=55777328 Ack=1304592121 Win=30272 Len=1358 
[TCP segment of a reassembled PDU]

Frame 8: 1412 bytes on wire (11296 bits), 1412 bytes captured (11296 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: 
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 
55777328, Ack: 1304592121, Len: 1358

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ????? 9 0.164646?????? 172.28.2.20 92.xxx.xxx.98????????? TLSv1.2? 
686??? Certificate, Server Key Exchange, Server Hello Done

Frame 9: 686 bytes on wire (5488 bits), 686 bytes captured (5488 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: 
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 
55778686, Ack: 1304592121, Len: 632
[4 Reassembled TCP Segments (4267 bytes): #6(1266), #7(1358), #8(1358), 
#9(285)]
Secure Sockets Layer
Secure Sockets Layer

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 10 0.220003?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
60???? 37213 ? 443 [ACK] Seq=1304592121 Ack=55777328 Win=63744 Len=0

Frame 10: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 
1304592121, Ack: 55777328, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 11 0.230229?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
60???? [TCP Window Update] 37213 ? 443 [ACK] Seq=1304592121 Ack=55777328 
Win=66304 Len=0

Frame 11: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 
1304592121, Ack: 55777328, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 12 0.230274?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
60???? 37213 ? 443 [ACK] Seq=1304592121 Ack=55779318 Win=65792 Len=0

Frame 12: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 
1304592121, Ack: 55779318, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 13 0.259598?????? 92.xxx.xxx.98 172.28.2.20?????????? TLSv1.2? 
180??? Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message

Frame 13: 180 bytes on wire (1440 bits), 180 bytes captured (1440 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 
1304592121, Ack: 55779318, Len: 126
Secure Sockets Layer

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 14 0.259707?????? 172.28.2.20 92.xxx.xxx.98????????? TCP????? 
54???? 443 ? 37213 [ACK] Seq=55779318 Ack=1304592247 Win=30272 Len=0

Frame 14: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: 
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 
55779318, Ack: 1304592247, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 15 0.276531?????? 172.28.2.20 92.xxx.xxx.98????????? TLSv1.2? 
105??? Change Cipher Spec, Encrypted Handshake Message

Frame 15: 105 bytes on wire (840 bits), 105 bytes captured (840 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: 
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 
55779318, Ack: 1304592247, Len: 51
Secure Sockets Layer

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 16 0.370238?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
60???? 37213 ? 443 [ACK] Seq=1304592247 Ack=55779369 Win=65792 Len=0

Frame 16: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 
1304592247, Ack: 55779369, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 17 1.621503?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
60???? 37213 ? 443 [FIN, ACK] Seq=1304592247 Ack=55779369 Win=65792 Len=0

Frame 17: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 
1304592247, Ack: 55779369, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 18 1.630448?????? 172.28.2.20 92.xxx.xxx.98????????? TCP????? 
54???? 443 ? 37213 [FIN, ACK] Seq=55779369 Ack=1304592248 Win=30272 Len=0

Frame 18: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: 
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 
55779369, Ack: 1304592248, Len: 0

No.???? Time?????????? Source??????????????? Destination Protocol Length 
Info
 ???? 19 1.680275?????? 92.xxx.xxx.98 172.28.2.20?????????? TCP????? 
60???? 37213 ? 443 [ACK] Seq=1304592248 Ack=55779370 Win=65792 Len=0

Frame 19: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: 
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 
1304592248, Ack: 55779370, Len: 0

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

I hope this is enough information.

Kind regards,

Gareth





[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux