We are trying to use Google Object storage and have a firewall that blocks hosts that sends "Unhandled External Packets". So below it seems that our client software tears down the connection on No. 24 so our firewall closes the connection completely and then Google responds with a RST on No. 25. Since the connection is already closed our firewall bans this IP. So I guess my question is... Is Google to blame?
No. Time Source Destination Protocol Length Info
1 0.000000 123.123.123.123 74.125.25.84 TCP 74 47379→443 [SYN] Seq=0 Win=14600 Len=0 MSS=1400 SACK_PERM=1 TSval=159142561 TSecr=0 WS=128
2 0.038908 74.125.25.84 123.123.123.123 TCP 74 443→47379 [SYN, ACK] Seq=0 Ack=1 Win=42540 Len=0 MSS=1400 SACK_PERM=1 TSval=983168135 TSecr=159142561 WS=128
3 0.041143 123.123.123.123 74.125.25.84 TCP 66 47379→443 [ACK] Seq=1 Ack=1 Win=14720 Len=0 TSval=159142603 TSecr=983168135
4 0.056158 123.123.123.123 74.125.25.84 TLSv1 286 Client Hello
5 0.095017 74.125.25.84 123.123.123.123 TCP 66 443→47379 [ACK] Seq=1 Ack=221 Win=43648 Len=0 TSval=983168191 TSecr=159142618
6 0.096134 74.125.25.84 123.123.123.123 TLSv1 1454 Server Hello
7 0.096187 74.125.25.84 123.123.123.123 TCP 1454 [TCP segment of a reassembled PDU]
8 0.096213 74.125.25.84 123.123.123.123 TLSv1 819 Certificate
9 0.098232 123.123.123.123 74.125.25.84 TCP 66 47379→443 [ACK] Seq=221 Ack=1389 Win=17408 Len=0 TSval=159142660 TSecr=983168192
10 0.098478 123.123.123.123 74.125.25.84 TCP 66 47379→443 [ACK] Seq=221 Ack=2777 Win=20224 Len=0 TSval=159142660 TSecr=983168192
11 0.098687 123.123.123.123 74.125.25.84 TCP 66 47379→443 [ACK] Seq=221 Ack=3530 Win=23040 Len=0 TSval=159142660 TSecr=983168192
12 0.103253 123.123.123.123 74.125.25.84 TLSv1 200 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
13 0.142249 74.125.25.84 123.123.123.123 TLSv1 125 Change Cipher Spec, Encrypted Handshake Message
14 0.144370 123.123.123.123 74.125.25.84 TLSv1 316 Application Data, Application Data
15 0.223258 74.125.25.84 123.123.123.123 TCP 66 443→47379 [ACK] Seq=3589 Ack=605 Win=45824 Len=0 TSval=983168319 TSecr=159142706
16 0.225626 123.123.123.123 74.125.25.84 TLSv1 1164 Application Data, Application Data
17 0.264448 74.125.25.84 123.123.123.123 TCP 66 443→47379 [ACK] Seq=3589 Ack=1703 Win=48000 Len=0 TSval=983168360 TSecr=159142787
18 0.277894 74.125.25.84 123.123.123.123 TLSv1 743 Application Data
19 0.278987 74.125.25.84 123.123.123.123 TLSv1 103 Application Data
20 0.279175 74.125.25.84 123.123.123.123 TLSv1 295 Application Data
21 0.279227 74.125.25.84 123.123.123.123 TCP 66 443→47379 [FIN, ACK] Seq=4532 Ack=1703 Win=48000 Len=0 TSval=983168375 TSecr=159142787
22 0.281132 123.123.123.123 74.125.25.84 TCP 66 47379→443 [ACK] Seq=1703 Ack=4303 Win=25728 Len=0 TSval=159142842 TSecr=983168374
23 0.281138 123.123.123.123 74.125.25.84 TLSv1 103 Encrypted Alert
24 0.282572 123.123.123.123 74.125.25.84 TCP 66 47379→443 [RST, ACK] Seq=1740 Ack=4533 Win=28544 Len=0 TSval=159142844 TSecr=983168375
25 0.320000 74.125.25.84 123.123.123.123 TCP 54 443→47379 [RST] Seq=4303 Win=0 Len=0
Details of No 21-25
No. Time Source Destination Protocol Length Info
21 0.279227 74.125.25.84 12.12.123.123 TCP 66 443?47379 [FIN, ACK] Seq=4532 Ack=1703 Win=48000 Len=0 TSval=983168375 TSecr=159142787
Frame 21: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: IETF-VRRP-VRID_02 (00:00:5e:00:01:02), Dst: Watchgua_11:f1:41 (01:91:71:11:f1:41)
Internet Protocol Version 4, Src: 74.125.25.84 (74.125.25.84), Dst: 12.12.123.123 (12.12.123.123)
Transmission Control Protocol, Src Port: 443 (443), Dst Port: 47379 (47379), Seq: 4532, Ack: 1703, Len: 0
No. Time Source Destination Protocol Length Info
22 0.281132 12.12.123.123 74.125.25.84 TCP 66 47379?443 [ACK] Seq=1703 Ack=4303 Win=25728 Len=0 TSval=159142842 TSecr=983168374
Frame 22: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: Watchgua_11:f1:41 (01:91:71:11:f1:41), Dst: IETF-VRRP-VRID_02 (00:00:5e:00:01:02)
Internet Protocol Version 4, Src: 12.12.123.123 (12.12.123.123), Dst: 74.125.25.84 (74.125.25.84)
Transmission Control Protocol, Src Port: 47379 (47379), Dst Port: 443 (443), Seq: 1703, Ack: 4303, Len: 0
No. Time Source Destination Protocol Length Info
23 0.281138 12.12.123.123 74.125.25.84 TLSv1 103 Encrypted Alert
Frame 23: 103 bytes on wire (824 bits), 103 bytes captured (824 bits)
Ethernet II, Src: Watchgua_11:f1:41 (01:91:71:11:f1:41), Dst: IETF-VRRP-VRID_02 (00:00:5e:00:01:02)
Internet Protocol Version 4, Src: 12.12.123.123 (12.12.123.123), Dst: 74.125.25.84 (74.125.25.84)
Transmission Control Protocol, Src Port: 47379 (47379), Dst Port: 443 (443), Seq: 1703, Ack: 4303, Len: 37
Secure Sockets Layer
No. Time Source Destination Protocol Length Info
24 0.282572 12.12.123.123 74.125.25.84 TCP 66 47379?443 [RST, ACK] Seq=1740 Ack=4533 Win=28544 Len=0 TSval=159142844 TSecr=983168375
Frame 24: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: Watchgua_11:f1:41 (01:91:71:11:f1:41), Dst: IETF-VRRP-VRID_02 (00:00:5e:00:01:02)
Internet Protocol Version 4, Src: 12.12.123.123 (12.12.123.123), Dst: 74.125.25.84 (74.125.25.84)
Transmission Control Protocol, Src Port: 47379 (47379), Dst Port: 443 (443), Seq: 1740, Ack: 4533, Len: 0
No. Time Source Destination Protocol Length Info
25 0.320000 74.125.25.84 12.12.123.123 TCP 54 443?47379 [RST] Seq=4303 Win=0 Len=0
Frame 25: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
Ethernet II, Src: IETF-VRRP-VRID_02 (00:00:5e:00:01:02), Dst: Watchgua_11:f1:41 (01:91:71:11:f1:41)
Internet Protocol Version 4, Src: 74.125.25.84 (74.125.25.84), Dst: 12.12.123.123 (12.12.123.123)
Transmission Control Protocol, Src Port: 443 (443), Dst Port: 47379 (47379), Seq: 4303, Len: 0
asked 23 Nov ‘14, 20:56
![ooga%20booga's gravatar image](https://secure.gravatar.com/avatar/bc1ebf9df0d9b3a0e12ea6407203156a?s=32&d=identicon&r=g)
ooga booga
11●1●1●3
accept rate: 0%
edited 24 Nov ‘14, 00:38
![grahamb's gravatar image](https://secure.gravatar.com/avatar/d2a7e24ca66604c749c7c88c1da8ff78?s=32&d=identicon&r=g)
grahamb ♦
19.8k●3●30●206