can somebody please explain the below packet capture output.I am not good with packet captures. Client:192.168.1.3
Thanks in advance asked 07 Nov '16, 08:50 Jith1010 edited 07 Nov '16, 09:45 sindy |
One Answer:
tcpdump's way of displaying TCP is, well, compact. Wireshark is aimed to render you the same information in much more user-friendly form, so if you cannot install Wireshark on the platform where you've taken that capture, just run In your case: 625 - the client sends a SYN packet, indicating that it supports window scaling and sack, and the MSS value 626 - the server responds with a SYN,ACK packet, indicating that it does not support window scaling by not placing the 627 - the client confirms reception of the server's SYN,ACK packet by sending its own ACK 628 - the client terminates the session in emergency mode by sending a RST packet, possibly because it didn't like that the server doesn't support window scaling, or because it didn't like something else about the server's response. The actual reason can not be found using tcpdump or Wireshark. Network analyzers tell you what has happened, but very rarely the protocols carry detailed information about why it has happened. answered 07 Nov '16, 13:55 sindy edited 07 Nov '16, 13:56 |
So in your opinion which side has more chance to have the issue ,client side or server side?
The initiative to terminate connection was client's.
As the client tears down the session at such an early stage, you may try to connect to other two https servers, one which does support window size scaling and another one which doesn't. If the client doesn't reset the connection to the first one at the same stage as in this capture and does reset at the same stage the connection to the second one, it is very likely that it doesn't like this particular feature (or the absence of it).