For some reason I'm getting TCP-out-of-order packets after the director initiates a connection. I've tried to look up what the possible cause of this is to no avail so far.
Here's the ethereal dump: No. Time Source Destination Protocol Info 1 0.000000 10.133.1.49 10.133.1.123 TCP 35112 > 9102 [SYN] Seq=0 Ack=0 Win=5840 Len=0 MSS=1460 TSV=3528869741 TSER=0 WS=0 Frame 1 (74 bytes on wire, 74 bytes captured) Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82 Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 (10.133.1.123) Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), Seq: 0, Ack: 0, Len: 0 Source port: 35112 (35112) Destination port: 9102 (9102) Sequence number: 0 (relative sequence number) Header length: 40 bytes Flags: 0x0002 (SYN) Window size: 5840 Checksum: 0x2442 (correct) Options: (20 bytes) No. Time Source Destination Protocol Info 2 0.000105 10.133.1.123 10.133.1.49 TCP 9102 > 35112 [SYN, ACK] Seq=0 Ack=1 Win=16384 Len=0 MSS=1460 WS=0 TSV=0 TSER=0 Frame 2 (78 bytes on wire, 78 bytes captured) Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:11:43:37:83:92 Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 (10.133.1.49) Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), Seq: 0, Ack: 1, Len: 0 Source port: 9102 (9102) Destination port: 35112 (35112) Sequence number: 0 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 44 bytes Flags: 0x0012 (SYN, ACK) Window size: 16384 Checksum: 0x40c1 (correct) Options: (24 bytes) SEQ/ACK analysis This is an ACK to the segment in frame: 1 The RTT to ACK the segment was: 0.000105000 seconds No. Time Source Destination Protocol Info 3 0.000225 10.133.1.49 10.133.1.123 TCP 35112 > 9102 [ACK] Seq=1 Ack=1 Win=5840 Len=0 TSV=3528869742 TSER=0 Frame 3 (66 bytes on wire, 66 bytes captured) Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82 Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 (10.133.1.123) Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), Seq: 1, Ack: 1, Len: 0 Source port: 35112 (35112) Destination port: 9102 (9102) Sequence number: 1 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 32 bytes Flags: 0x0010 (ACK) Window size: 5840 Checksum: 0x90f7 (correct) Options: (12 bytes) SEQ/ACK analysis This is an ACK to the segment in frame: 2 The RTT to ACK the segment was: 0.000120000 seconds No. Time Source Destination Protocol Info 4 0.000312 10.133.1.49 10.133.1.123 TCP 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528869742 TSER=0 Frame 4 (70 bytes on wire, 70 bytes captured) Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82 Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 (10.133.1.123) Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), Seq: 1, Ack: 1, Len: 4 Source port: 35112 (35112) Destination port: 9102 (9102) Sequence number: 1 (relative sequence number) Next sequence number: 5 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 32 bytes Flags: 0x0018 (PSH, ACK) Window size: 5840 Checksum: 0x90cd (correct) Options: (12 bytes) Data (4 bytes) 0000 00 00 00 1e .... No. Time Source Destination Protocol Info 5 0.158994 10.133.1.123 10.133.1.49 TCP 9102 > 35112 [ACK] Seq=1 Ack=5 Win=65531 [CHECKSUM INCORRECT] Len=0 TSV=56609366 TSER=3528869741 Frame 5 (66 bytes on wire, 66 bytes captured) Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 (10.133.1.49) Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), Seq: 1, Ack: 5, Len: 0 Source port: 9102 (9102) Destination port: 35112 (35112) Sequence number: 1 (relative sequence number) Acknowledgement number: 5 (relative ack number) Header length: 32 bytes Flags: 0x0010 (ACK) Window size: 65531 Checksum: 0x17dc (incorrect, should be 0xda12) Options: (12 bytes) SEQ/ACK analysis This is an ACK to the segment in frame: 4 The RTT to ACK the segment was: 0.158682000 seconds No. Time Source Destination Protocol Info 6 0.193624 10.133.1.49 10.133.1.123 TCP 35112 > 9102 [RST, ACK] Seq=5 Ack=1 Win=65531 Len=0 TSV=56609366 TSER=3528869741 Frame 6 (66 bytes on wire, 66 bytes captured) Ethernet II, Src: 00:13:c3:75:19:7b, Dst: 00:14:22:19:ec:82 Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 (10.133.1.123) Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), Seq: 5, Ack: 1, Len: 0 Source port: 35112 (35112) Destination port: 9102 (9102) Sequence number: 5 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 32 bytes Flags: 0x0014 (RST, ACK) Window size: 65531 Checksum: 0xda0e (correct) Options: (12 bytes) SEQ/ACK analysis No. Time Source Destination Protocol Info 7 0.201763 10.133.1.49 10.133.1.123 TCP [TCP Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528869943 TSER=0 Frame 7 (70 bytes on wire, 70 bytes captured) Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82 Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 (10.133.1.123) Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), Seq: 1, Ack: 1, Len: 4 Source port: 35112 (35112) Destination port: 9102 (9102) Sequence number: 1 (relative sequence number) Next sequence number: 5 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 32 bytes Flags: 0x0018 (PSH, ACK) Window size: 5840 Checksum: 0x9004 (correct) Options: (12 bytes) SEQ/ACK analysis TCP Analysis Flags This frame is a (suspected) out-of-order segment Data (4 bytes) 0000 00 00 00 1e .... No. Time Source Destination Protocol Info 8 0.201782 10.133.1.123 10.133.1.49 TCP 9102 > 35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0 Frame 8 (54 bytes on wire, 54 bytes captured) Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 (10.133.1.49) Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), Seq: 1, Ack: 4239824515, Len: 0 Source port: 9102 (9102) Destination port: 35112 (35112) Sequence number: 1 (relative sequence number) Header length: 20 bytes Flags: 0x0004 (RST) Window size: 0 Checksum: 0x6777 (correct) No. Time Source Destination Protocol Info 9 0.603661 10.133.1.49 10.133.1.123 TCP [TCP Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528870345 TSER=0 Frame 9 (70 bytes on wire, 70 bytes captured) Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82 Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 (10.133.1.123) Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), Seq: 1, Ack: 1, Len: 4 Source port: 35112 (35112) Destination port: 9102 (9102) Sequence number: 1 (relative sequence number) Next sequence number: 5 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 32 bytes Flags: 0x0018 (PSH, ACK) Window size: 5840 Checksum: 0x8e72 (correct) Options: (12 bytes) SEQ/ACK analysis TCP Analysis Flags This frame is a (suspected) out-of-order segment Data (4 bytes) 0000 00 00 00 1e .... No. Time Source Destination Protocol Info 10 0.603675 10.133.1.123 10.133.1.49 TCP 9102 > 35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0 Frame 10 (54 bytes on wire, 54 bytes captured) Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 (10.133.1.49) Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), Seq: 1, Ack: 4239824515, Len: 0 Source port: 9102 (9102) Destination port: 35112 (35112) Sequence number: 1 (relative sequence number) Header length: 20 bytes Flags: 0x0004 (RST) Window size: 0 Checksum: 0x6777 (correct) SEQ/ACK analysis No. Time Source Destination Protocol Info 11 1.407469 10.133.1.49 10.133.1.123 TCP [TCP Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528871149 TSER=0 Frame 11 (70 bytes on wire, 70 bytes captured) Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82 Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 (10.133.1.123) Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), Seq: 1, Ack: 1, Len: 4 Source port: 35112 (35112) Destination port: 9102 (9102) Sequence number: 1 (relative sequence number) Next sequence number: 5 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 32 bytes Flags: 0x0018 (PSH, ACK) Window size: 5840 Checksum: 0x8b4e (correct) Options: (12 bytes) SEQ/ACK analysis TCP Analysis Flags This frame is a (suspected) out-of-order segment Data (4 bytes) 0000 00 00 00 1e .... No. Time Source Destination Protocol Info 12 1.407492 10.133.1.123 10.133.1.49 TCP 9102 > 35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0 Frame 12 (54 bytes on wire, 54 bytes captured) Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 (10.133.1.49) Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), Seq: 1, Ack: 4239824515, Len: 0 Source port: 9102 (9102) Destination port: 35112 (35112) Sequence number: 1 (relative sequence number) Header length: 20 bytes Flags: 0x0004 (RST) Window size: 0 Checksum: 0x6777 (correct) SEQ/ACK analysis No. Time Source Destination Protocol Info 13 3.015091 10.133.1.49 10.133.1.123 TCP [TCP Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528872757 TSER=0 Frame 13 (70 bytes on wire, 70 bytes captured) Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82 Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 (10.133.1.123) Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), Seq: 1, Ack: 1, Len: 4 Source port: 35112 (35112) Destination port: 9102 (9102) Sequence number: 1 (relative sequence number) Next sequence number: 5 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 32 bytes Flags: 0x0018 (PSH, ACK) Window size: 5840 Checksum: 0x8506 (correct) Options: (12 bytes) SEQ/ACK analysis TCP Analysis Flags This frame is a (suspected) out-of-order segment Data (4 bytes) 0000 00 00 00 1e .... No. Time Source Destination Protocol Info 14 3.015112 10.133.1.123 10.133.1.49 TCP 9102 > 35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0 Frame 14 (54 bytes on wire, 54 bytes captured) Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 (10.133.1.49) Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), Seq: 1, Ack: 4239824515, Len: 0 Source port: 9102 (9102) Destination port: 35112 (35112) Sequence number: 1 (relative sequence number) Header length: 20 bytes Flags: 0x0004 (RST) Window size: 0 Checksum: 0x6777 (correct) SEQ/ACK analysis No. Time Source Destination Protocol Info 15 6.230331 10.133.1.49 10.133.1.123 TCP [TCP Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528875973 TSER=0 Frame 15 (70 bytes on wire, 70 bytes captured) Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82 Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 (10.133.1.123) Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), Seq: 1, Ack: 1, Len: 4 Source port: 35112 (35112) Destination port: 9102 (9102) Sequence number: 1 (relative sequence number) Next sequence number: 5 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 32 bytes Flags: 0x0018 (PSH, ACK) Window size: 5840 Checksum: 0x7876 (correct) Options: (12 bytes) SEQ/ACK analysis TCP Analysis Flags This frame is a (suspected) out-of-order segment Data (4 bytes) 0000 00 00 00 1e .... No. Time Source Destination Protocol Info 16 6.230356 10.133.1.123 10.133.1.49 TCP 9102 > 35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0 Frame 16 (54 bytes on wire, 54 bytes captured) Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:11:43:37:83:92 Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 (10.133.1.49) Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), Seq: 1, Ack: 4239824515, Len: 0 Source port: 9102 (9102) Destination port: 35112 (35112) Sequence number: 1 (relative sequence number) Header length: 20 bytes Flags: 0x0004 (RST) Window size: 0 Checksum: 0x6777 (correct) SEQ/ACK analysis >>> Arno Lehmann <[EMAIL PROTECTED]> 05/05/06 10:58 >>> Hello, On 5/5/2006 12:42 PM, Chris Boyd wrote: > >>>>Arno Lehmann <[EMAIL PROTECTED]> 05/04/06 6:59 >>> > > Hello, > > On 5/4/2006 4:38 PM, Chris Boyd wrote: > >>I'm running winbacula-1.38.8 on a win2003 server. The director is 1.36.3 > > >>>Not a good idea, but that's fixed, I suppose. > > > Why not a good idea? Because, AFAIK, 1.38 is not proven to be compatible with 1.36. Note that I had that combination runnin for some time, too, and didn't see any problems, but then I didn't check all features. From the release notes: Major Changes in 1.38: ... - The Director, Storage daemon, and File daemons are Deamons are not compatible with prior versions. All FDs must be upgraded at the same time. > >>on a SuSE SLES 9.0. It keeps failing to connect with the usual error message. >>However I can ping the win server and telnet to port 9102. I restart the >>daemon on both ends and it still keeps loosing connection. I tried setting >>the administrator logon in the File Daemon and updating the FD (to 1.38.8). >>It's the only server I'm having this problem with...so I'm not sure what the >>problem might be. > > >>>Firewall in between? > > > Ah sorry I forgot to mention that. No firewall, both hosts on the LAN behind > firewall. > >>>Host access? > > ?? I qoute from my /etc/hosts.allow: # See `man tcpd and `man 5 hosts_access for a detailed description # of /etc/hosts.allow and /etc/hosts.deny. > > >>>Passwords don't match? > > > It sometimes makes a connx. Ah... sometimes. Difficult beast. Have you tried observing the network traffic using, for example, tcpdump or ethereal? Or do other services suffer similar problems? Arno >>>Did you try connecting from the FD to the SD? Being able to telnet _to_ >>>the win server is not enough, the FD initiates the connection to the SD. > > Sometimes it does and sometimes it doesn't. > > > > > Arno > > >>----------------------------------------------------------------- >>This email message is intended only for the addressee(s) >>and contains information that may be confidential and/or >>copyrighted. If you are not the intended recipient please >>notify the sender by reply email and immediately delete >>this email. Use, disclosure or reproduction of this email >>by anyone other than the intended recipient(s) is strictly >>prohibited. USIT has scanned this email for viruses and >>dangerous content and believes it to be clean. However, >>virus scanning is ultimately the responsibility of the recipient. >>----------------------------------------------------------------- >> >> >> >>------------------------------------------------------- >>Using Tomcat but need to do more? Need to support web services, security? >>Get stuff done quickly with pre-integrated technology to make your job easier >>Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo >>http://sel.as-us.falkag.net/sel?cmd=k&kid0709&bid&3057&dat1642 >>_______________________________________________ >>Bacula-users mailing list >>Bacula-users@lists.sourceforge.net >>https://lists.sourceforge.net/lists/listinfo/bacula-users >> > > -- IT-Service Lehmann [EMAIL PROTECTED] Arno Lehmann http://www.its-lehmann.de ------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid0709&bid&3057&dat1642 _______________________________________________ Bacula-users mailing list Bacula-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bacula-users ----------------------------------------------------------------- This email message is intended only for the addressee(s) and contains information that may be confidential and/or copyrighted. If you are not the intended recipient please notify the sender by reply email and immediately delete this email. Use, disclosure or reproduction of this email by anyone other than the intended recipient(s) is strictly prohibited. USIT has scanned this email for viruses and dangerous content and believes it to be clean. However, virus scanning is ultimately the responsibility of the recipient. ----------------------------------------------------------------- ------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid0709&bid&3057&dat1642 _______________________________________________ Bacula-users mailing list Bacula-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bacula-users