For some reason I'm getting TCP-out-of-order packets after the director 
initiates a connection. 
I've tried to look up what the possible cause of this is to no avail so far. 

Here's the ethereal dump:

No.     Time        Source                Destination           Protocol Info
      1 0.000000    10.133.1.49           10.133.1.123          TCP      35112 
> 9102 [SYN] Seq=0 Ack=0 Win=5840 Len=0 MSS=1460 TSV=3528869741 TSER=0 WS=0

Frame 1 (74 bytes on wire, 74 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), 
Seq: 0, Ack: 0, Len: 0
    Source port: 35112 (35112)
    Destination port: 9102 (9102)
    Sequence number: 0    (relative sequence number)
    Header length: 40 bytes
    Flags: 0x0002 (SYN)
    Window size: 5840
    Checksum: 0x2442 (correct)
    Options: (20 bytes)

No.     Time        Source                Destination           Protocol Info
      2 0.000105    10.133.1.123          10.133.1.49           TCP      9102 > 
35112 [SYN, ACK] Seq=0 Ack=1 Win=16384 Len=0 MSS=1460 WS=0 TSV=0 TSER=0

Frame 2 (78 bytes on wire, 78 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:11:43:37:83:92
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), 
Seq: 0, Ack: 1, Len: 0
    Source port: 9102 (9102)
    Destination port: 35112 (35112)
    Sequence number: 0    (relative sequence number)
    Acknowledgement number: 1    (relative ack number)
    Header length: 44 bytes
    Flags: 0x0012 (SYN, ACK)
    Window size: 16384
    Checksum: 0x40c1 (correct)
    Options: (24 bytes)
    SEQ/ACK analysis
        This is an ACK to the segment in frame: 1
        The RTT to ACK the segment was: 0.000105000 seconds

No.     Time        Source                Destination           Protocol Info
      3 0.000225    10.133.1.49           10.133.1.123          TCP      35112 
> 9102 [ACK] Seq=1 Ack=1 Win=5840 Len=0 TSV=3528869742 TSER=0

Frame 3 (66 bytes on wire, 66 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), 
Seq: 1, Ack: 1, Len: 0
    Source port: 35112 (35112)
    Destination port: 9102 (9102)
    Sequence number: 1    (relative sequence number)
    Acknowledgement number: 1    (relative ack number)
    Header length: 32 bytes
    Flags: 0x0010 (ACK)
    Window size: 5840
    Checksum: 0x90f7 (correct)
    Options: (12 bytes)
    SEQ/ACK analysis
        This is an ACK to the segment in frame: 2
        The RTT to ACK the segment was: 0.000120000 seconds

No.     Time        Source                Destination           Protocol Info
      4 0.000312    10.133.1.49           10.133.1.123          TCP      35112 
> 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528869742 TSER=0

Frame 4 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), 
Seq: 1, Ack: 1, Len: 4
    Source port: 35112 (35112)
    Destination port: 9102 (9102)
    Sequence number: 1    (relative sequence number)
    Next sequence number: 5    (relative sequence number)
    Acknowledgement number: 1    (relative ack number)
    Header length: 32 bytes
    Flags: 0x0018 (PSH, ACK)
    Window size: 5840
    Checksum: 0x90cd (correct)
    Options: (12 bytes)
Data (4 bytes)

0000  00 00 00 1e                                       ....

No.     Time        Source                Destination           Protocol Info
      5 0.158994    10.133.1.123          10.133.1.49           TCP      9102 > 
35112 [ACK] Seq=1 Ack=5 Win=65531 [CHECKSUM INCORRECT] Len=0 TSV=56609366 
TSER=3528869741

Frame 5 (66 bytes on wire, 66 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), 
Seq: 1, Ack: 5, Len: 0
    Source port: 9102 (9102)
    Destination port: 35112 (35112)
    Sequence number: 1    (relative sequence number)
    Acknowledgement number: 5    (relative ack number)
    Header length: 32 bytes
    Flags: 0x0010 (ACK)
    Window size: 65531
    Checksum: 0x17dc (incorrect, should be 0xda12)
    Options: (12 bytes)
    SEQ/ACK analysis
        This is an ACK to the segment in frame: 4
        The RTT to ACK the segment was: 0.158682000 seconds

No.     Time        Source                Destination           Protocol Info
      6 0.193624    10.133.1.49           10.133.1.123          TCP      35112 
> 9102 [RST, ACK] Seq=5 Ack=1 Win=65531 Len=0 TSV=56609366 TSER=3528869741

Frame 6 (66 bytes on wire, 66 bytes captured)
Ethernet II, Src: 00:13:c3:75:19:7b, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), 
Seq: 5, Ack: 1, Len: 0
    Source port: 35112 (35112)
    Destination port: 9102 (9102)
    Sequence number: 5    (relative sequence number)
    Acknowledgement number: 1    (relative ack number)
    Header length: 32 bytes
    Flags: 0x0014 (RST, ACK)
    Window size: 65531
    Checksum: 0xda0e (correct)
    Options: (12 bytes)
    SEQ/ACK analysis

No.     Time        Source                Destination           Protocol Info
      7 0.201763    10.133.1.49           10.133.1.123          TCP      [TCP 
Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528869943 
TSER=0

Frame 7 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), 
Seq: 1, Ack: 1, Len: 4
    Source port: 35112 (35112)
    Destination port: 9102 (9102)
    Sequence number: 1    (relative sequence number)
    Next sequence number: 5    (relative sequence number)
    Acknowledgement number: 1    (relative ack number)
    Header length: 32 bytes
    Flags: 0x0018 (PSH, ACK)
    Window size: 5840
    Checksum: 0x9004 (correct)
    Options: (12 bytes)
    SEQ/ACK analysis
        TCP Analysis Flags
            This frame is a (suspected) out-of-order segment
Data (4 bytes)

0000  00 00 00 1e                                       ....

No.     Time        Source                Destination           Protocol Info
      8 0.201782    10.133.1.123          10.133.1.49           TCP      9102 > 
35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0

Frame 8 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), 
Seq: 1, Ack: 4239824515, Len: 0
    Source port: 9102 (9102)
    Destination port: 35112 (35112)
    Sequence number: 1    (relative sequence number)
    Header length: 20 bytes
    Flags: 0x0004 (RST)
    Window size: 0
    Checksum: 0x6777 (correct)

No.     Time        Source                Destination           Protocol Info
      9 0.603661    10.133.1.49           10.133.1.123          TCP      [TCP 
Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528870345 
TSER=0

Frame 9 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), 
Seq: 1, Ack: 1, Len: 4
    Source port: 35112 (35112)
    Destination port: 9102 (9102)
    Sequence number: 1    (relative sequence number)
    Next sequence number: 5    (relative sequence number)
    Acknowledgement number: 1    (relative ack number)
    Header length: 32 bytes
    Flags: 0x0018 (PSH, ACK)
    Window size: 5840
    Checksum: 0x8e72 (correct)
    Options: (12 bytes)
    SEQ/ACK analysis
        TCP Analysis Flags
            This frame is a (suspected) out-of-order segment
Data (4 bytes)

0000  00 00 00 1e                                       ....

No.     Time        Source                Destination           Protocol Info
     10 0.603675    10.133.1.123          10.133.1.49           TCP      9102 > 
35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0

Frame 10 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), 
Seq: 1, Ack: 4239824515, Len: 0
    Source port: 9102 (9102)
    Destination port: 35112 (35112)
    Sequence number: 1    (relative sequence number)
    Header length: 20 bytes
    Flags: 0x0004 (RST)
    Window size: 0
    Checksum: 0x6777 (correct)
    SEQ/ACK analysis

No.     Time        Source                Destination           Protocol Info
     11 1.407469    10.133.1.49           10.133.1.123          TCP      [TCP 
Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528871149 
TSER=0

Frame 11 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), 
Seq: 1, Ack: 1, Len: 4
    Source port: 35112 (35112)
    Destination port: 9102 (9102)
    Sequence number: 1    (relative sequence number)
    Next sequence number: 5    (relative sequence number)
    Acknowledgement number: 1    (relative ack number)
    Header length: 32 bytes
    Flags: 0x0018 (PSH, ACK)
    Window size: 5840
    Checksum: 0x8b4e (correct)
    Options: (12 bytes)
    SEQ/ACK analysis
        TCP Analysis Flags
            This frame is a (suspected) out-of-order segment
Data (4 bytes)

0000  00 00 00 1e                                       ....

No.     Time        Source                Destination           Protocol Info
     12 1.407492    10.133.1.123          10.133.1.49           TCP      9102 > 
35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0

Frame 12 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), 
Seq: 1, Ack: 4239824515, Len: 0
    Source port: 9102 (9102)
    Destination port: 35112 (35112)
    Sequence number: 1    (relative sequence number)
    Header length: 20 bytes
    Flags: 0x0004 (RST)
    Window size: 0
    Checksum: 0x6777 (correct)
    SEQ/ACK analysis

No.     Time        Source                Destination           Protocol Info
     13 3.015091    10.133.1.49           10.133.1.123          TCP      [TCP 
Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528872757 
TSER=0

Frame 13 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), 
Seq: 1, Ack: 1, Len: 4
    Source port: 35112 (35112)
    Destination port: 9102 (9102)
    Sequence number: 1    (relative sequence number)
    Next sequence number: 5    (relative sequence number)
    Acknowledgement number: 1    (relative ack number)
    Header length: 32 bytes
    Flags: 0x0018 (PSH, ACK)
    Window size: 5840
    Checksum: 0x8506 (correct)
    Options: (12 bytes)
    SEQ/ACK analysis
        TCP Analysis Flags
            This frame is a (suspected) out-of-order segment
Data (4 bytes)

0000  00 00 00 1e                                       ....

No.     Time        Source                Destination           Protocol Info
     14 3.015112    10.133.1.123          10.133.1.49           TCP      9102 > 
35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0

Frame 14 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), 
Seq: 1, Ack: 4239824515, Len: 0
    Source port: 9102 (9102)
    Destination port: 35112 (35112)
    Sequence number: 1    (relative sequence number)
    Header length: 20 bytes
    Flags: 0x0004 (RST)
    Window size: 0
    Checksum: 0x6777 (correct)
    SEQ/ACK analysis

No.     Time        Source                Destination           Protocol Info
     15 6.230331    10.133.1.49           10.133.1.123          TCP      [TCP 
Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528875973 
TSER=0

Frame 15 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123 
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102), 
Seq: 1, Ack: 1, Len: 4
    Source port: 35112 (35112)
    Destination port: 9102 (9102)
    Sequence number: 1    (relative sequence number)
    Next sequence number: 5    (relative sequence number)
    Acknowledgement number: 1    (relative ack number)
    Header length: 32 bytes
    Flags: 0x0018 (PSH, ACK)
    Window size: 5840
    Checksum: 0x7876 (correct)
    Options: (12 bytes)
    SEQ/ACK analysis
        TCP Analysis Flags
            This frame is a (suspected) out-of-order segment
Data (4 bytes)

0000  00 00 00 1e                                       ....

No.     Time        Source                Destination           Protocol Info
     16 6.230356    10.133.1.123          10.133.1.49           TCP      9102 > 
35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0

Frame 16 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:11:43:37:83:92
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49 
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112), 
Seq: 1, Ack: 4239824515, Len: 0
    Source port: 9102 (9102)
    Destination port: 35112 (35112)
    Sequence number: 1    (relative sequence number)
    Header length: 20 bytes
    Flags: 0x0004 (RST)
    Window size: 0
    Checksum: 0x6777 (correct)
    SEQ/ACK analysis


>>> Arno Lehmann <[EMAIL PROTECTED]> 05/05/06 10:58  >>>
Hello,

On 5/5/2006 12:42 PM, Chris Boyd wrote:
> 
>>>>Arno Lehmann <[EMAIL PROTECTED]> 05/04/06 6:59  >>>
> 
> Hello,
> 
> On 5/4/2006 4:38 PM, Chris Boyd wrote:
> 
>>I'm running winbacula-1.38.8 on a win2003 server. The director is 1.36.3
> 
> 
>>>Not a good idea, but that's fixed, I suppose.
> 
> 
> Why not a good idea? 

Because, AFAIK, 1.38 is not proven to be compatible with 1.36. Note that 
I had that combination runnin for some time, too, and didn't see any 
problems, but then I didn't check all features.

 From the release notes:

Major Changes in 1.38:
...
- The Director, Storage daemon, and File daemons are
   Deamons are not compatible with prior versions.
   All FDs must be upgraded at the same time.

> 
>>on a SuSE SLES 9.0. It keeps failing to connect with the usual error message.
>>However I can ping the win server and telnet to port 9102. I restart the 
>>daemon on both ends and it still keeps loosing connection. I tried setting 
>>the administrator logon in the File Daemon and updating the FD (to 1.38.8). 
>>It's the only server I'm having this problem with...so I'm not sure what the 
>>problem might be. 
> 
> 
>>>Firewall in between? 
> 
> 
> Ah sorry I forgot to mention that. No firewall, both hosts on the LAN behind 
> firewall. 
> 
>>>Host access?
> 
> ??

I qoute from my /etc/hosts.allow:

# See `man tcpd  and `man 5 hosts_access  for a detailed description
# of /etc/hosts.allow and /etc/hosts.deny.

> 
> 
>>>Passwords don't match?
> 
> 
> It sometimes makes a connx.

Ah... sometimes. Difficult beast. Have you tried observing the network 
traffic using, for example, tcpdump or ethereal?

Or do other services suffer similar problems?

Arno

>>>Did you try connecting from the FD to the SD? Being able to telnet _to_ 
>>>the win server is not enough, the FD initiates the connection to the SD.
> 
> Sometimes it does and sometimes it doesn't. 
> 
> 
> 
> 
> Arno
> 
> 
>>-----------------------------------------------------------------
>>This email message is intended only for the addressee(s) 
>>and contains information that may be confidential and/or 
>>copyrighted.  If you are not the intended recipient please 
>>notify the sender by reply email and immediately delete 
>>this email. Use, disclosure or reproduction of this email 
>>by anyone other than the intended recipient(s) is strictly 
>>prohibited. USIT has scanned this email for viruses and 
>>dangerous content and believes it to be clean. However, 
>>virus scanning is ultimately the responsibility of the recipient.
>>-----------------------------------------------------------------
>>
>>
>>
>>-------------------------------------------------------
>>Using Tomcat but need to do more? Need to support web services, security?
>>Get stuff done quickly with pre-integrated technology to make your job easier
>>Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
>>http://sel.as-us.falkag.net/sel?cmd=k&kid0709&bid&3057&dat1642 
>>_______________________________________________
>>Bacula-users mailing list
>>Bacula-users@lists.sourceforge.net 
>>https://lists.sourceforge.net/lists/listinfo/bacula-users 
>>
> 
> 

-- 
IT-Service Lehmann                    [EMAIL PROTECTED] 
Arno Lehmann                  http://www.its-lehmann.de 



-------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid0709&bid&3057&dat1642 
_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net 
https://lists.sourceforge.net/lists/listinfo/bacula-users

-----------------------------------------------------------------
This email message is intended only for the addressee(s) 
and contains information that may be confidential and/or 
copyrighted.  If you are not the intended recipient please 
notify the sender by reply email and immediately delete 
this email. Use, disclosure or reproduction of this email 
by anyone other than the intended recipient(s) is strictly 
prohibited. USIT has scanned this email for viruses and 
dangerous content and believes it to be clean. However, 
virus scanning is ultimately the responsibility of the recipient.
-----------------------------------------------------------------



-------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid0709&bid&3057&dat1642
_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users

Reply via email to