* Max Feil <mfeil@xxxxxxx>: > Already did use Wireshark. Here is some more info: > > If you look through the traces you'll notice that at some point Squid sends a TCP [FIN, ACK] right in the middle of a connection for seemingly no reason. (Attempting to close the connection) The server ignores this and sends the rest of the data, which Squid responds to with TCP RST (request to reset) since it now believes the connection to be closed. That sounds like a Checkpoint FW-1 with "smart defense" (aka bloody stupid crap) somewhere in the path -- Ralf Hildebrandt GeschÃftsbereich IT | Abteilung Netzwerk Charità - UniversitÃtsmedizin Berlin Campus Benjamin Franklin Hindenburgdamm 30 | D-12203 Berlin Tel. +49 30 450 570 155 | Fax: +49 30 450 570 962 ralf.hildebrandt@xxxxxxxxxx | http://www.charite.de