Hi, Please check for me below link: is it block the 443? but i can telnet with 443. what is the root cause of this issue? http://www.sendspace.com/file/qyv69e Please help me, thanks. ko htwe asked 18 Apr '13, 23:56 aungkohtwe |
2 Answers:
The screen shot doesn't tell much except there is a reset coming back as an answer to a SYN, so it looks like the session is refused. You'd need to provide more detailed information to see what's going on. BTW: removing parts of the target IP address in the packet list in the screenshot (where you put "x.x.x") doesn't help much hiding it when you forget that it is also seen in the IP layer in the decode pane... answered 19 Apr '13, 00:04 Jasper ♦♦ edited 19 Apr '13, 00:05 |
UPDATE
I just saw the pcap file you posted. The PCAP file contains a secure SIP session (port 5061), not a HTTPS connection (port 443) to the server in question (203.126.29.157). Maybe that's your problem, a misunderstanding of the ports being used!?! As I said, the server also accepts TCP connections on port 443, but it does not respond to the SSL handshake. That could be an error or it could be intentional. Please ask the operator of the site.
no, port 443 is not blocked.
The server accepts the TCP connection, but it does not answer the SSL/TLS handshake. It also does not answer a HTTP request on port 443, which is a common config error of web servers. So, it could be a general configuration error or a problem with the server software. Please contact the owner of the site and ask for help. curl
openssl
cloudshark Regards answered 19 Apr '13, 01:07 Kurt Knochner ♦ edited 19 Apr '13, 02:11 |
Thanks Jasper,
you can see below full of the list
http://www.sendspace.com/file/8w0rta
i want to check 203.126.29.157/57 to 192.168.100.148 , any port number is block?
Thanks,
Ko Htwe
No, there is no general port number block, because there are conversations in the trace you provided where data is exchanged successfully. Maybe there is a connection rate limit (meaning: if you try to connect too often, you'll be refused) since there are a few session rejects, but the port seems to be open generally.
Thanks Jasper,
please help me check again for me, I am still leaner for wireshark
http://www.sendspace.com/file/5pcgng
picture 1_2 is ACK and RST and Win = 0 Len = 0, what is that mean?
picture 2_2 is TCP fast retransmission, is the packet lost?
Sometime Win number is bigger than ACK. why ? is it bcs of Duplicate packets?
Best Regards and Thanks,
Ko Htwe
[I converted your answer to a comment again; please use comments for follow ups]
Okay, so the reset in packet #63 seems pretty normal; you have a conversation starting in packet 36 which exchanges some data and gets torn down (even if a bit harsh, FIN followed by RST, but not unheard of). Filter used: "(ip.addr eq 203.126.29.157 and ip.addr eq 192.168.100.148) and (tcp.port eq 5061 and tcp.port eq 57810)"
The other one (RST in 685) seems more problematic: it is torn down as a result of no packets coming back from 203.126.29.158 for almost 15 seconds. On a closer look it is not that bad - the client acknowledges incoming data in 141 and has nothing else to say, so the connection is terminated after an inactivity timeout. Pretty normal, too. Filter used: "(ip.addr eq 192.168.100.148 and ip.addr eq 203.126.29.158) and (tcp.port eq 57811 and tcp.port eq 443)"
So far, nothing bad is happening with the resets in your trace ;-)