FreeBSD Bugzilla – Attachment 166886 Details for
Bug 207087
kernel: r295285 in 10.2-STABLE breaks OpenVPN functionality
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
tcpdump.txt
tcpdump.txt (text/plain), 2.85 KB, created by
g_amanakis
on 2016-02-12 03:03:46 UTC
(
hide
)
Description:
tcpdump.txt
Filename:
MIME Type:
Creator:
g_amanakis
Created:
2016-02-12 03:03:46 UTC
Size:
2.85 KB
patch
obsolete
>sudo tcpdump -nni bridge0 host yy.yyy.10.207 and port 80 >tcpdump: verbose output suppressed, use -v or -vv for full protocol decode >listening on bridge0, link-type EN10MB (Ethernet), capture size 65535 bytes >21:56:36.490989 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [S], seq 1291572589, win 14600, options [mss 1460,sackOK,TS val 66856106 ecr 0,nop,wscale 6], length 0 >21:56:36.598377 IP 213.95.206.41.80 > yy.yyy.10.207.59068: Flags [S.], seq 389153084, ack 1291572590, win 7300, options [mss 1460], length 0 >21:56:36.599414 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [.], ack 1, win 14600, length 0 >21:56:36.600134 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 >21:56:36.925982 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 >21:56:37.592991 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 >21:56:38.912839 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 >21:56:41.559227 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 >21:56:46.847599 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [P.], seq 1:717, ack 1, win 14600, length 716 >21:56:51.707421 IP 213.95.206.41.80 > yy.yyy.10.207.59068: Flags [F.], seq 1, ack 1, win 7300, length 0 >21:56:51.916556 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [.], ack 2, win 14600, length 0 >21:56:51.920041 IP yy.yyy.10.207.59068 > 213.95.206.41.80: Flags [F.], seq 717, ack 2, win 14600, length 0 >21:56:52.037353 IP 213.95.206.41.80 > yy.yyy.10.207.59068: Flags [R], seq 389153086, win 0, length 0 >^C >13 packets captured >63 packets received by filter >0 packets dropped by kernel > > >sudo tcpdump -nni em0 port 80 >tcpdump: verbose output suppressed, use -v or -vv for full protocol decode >listening on em0, link-type EN10MB (Ethernet), capture size 65535 bytes >21:57:41.407146 IP6 2607:f8b0:4004:808::1003.80 > 2601:152:4380:1fac:30bf:f0a0:8472:c685.37679: Flags [R], seq 95977522, win 0, length 0 >21:57:41.500216 IP xx.xxx.143.153.56836 > 213.95.206.42.80: Flags [S], seq 1243298629, win 14600, options [mss 1460,sackOK,TS val 66862610 ecr 0,nop,wscale 6], length 0 >21:57:41.608149 IP 213.95.206.42.80 > xx.xxx.143.153.56836: Flags [S.], seq 966800353, ack 1243298630, win 7300, options [mss 1460], length 0 >21:57:41.609674 IP xx.xxx.143.153.56836 > 213.95.206.42.80: Flags [.], ack 1, win 14600, length 0 >21:57:56.715628 IP 213.95.206.42.80 > xx.xxx.143.153.56836: Flags [F.], seq 1, ack 1, win 7300, length 0 >21:57:56.721375 IP xx.xxx.143.153.56836 > 213.95.206.42.80: Flags [F.], seq 717, ack 2, win 14600, length 0 >21:57:56.874673 IP 213.95.206.42.80 > xx.xxx.143.153.56836: Flags [R], seq 966800355, win 0, length 0 >^C >8 packets captured >110 packets received by filter >0 packets dropped by kernel > >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 207087
:
166844
|
166845
|
166885
| 166886 |
166901
|
166908
|
166909
|
167003
|
167004
|
167113
|
167150