On Tue, Dec 06, 2022 at 05:42:59PM -0500, A. F. Cano wrote: >... > > Good call. Found this: > > Dec 06 16:53:25 fbx infinoted[254226]: [Tue Dec 6 16:53:25 2022] INFO: > Unsuccessful connection attempt from [::ffff:192.168.xxx.x]:54424 (no client > certificate)
I did a wireshark capture for port 6523. The first surprising result is that nothing showed up in the filtered capture when I started gobby, but all the hosts in the Document Browser panel already had the small red "x" on the bottom right of the icons. Why would gobby know that something was wrong before sending anything on port 6523. Does it send other stuff on other ports that prompt the red "x"s? Might this be filtered/stopped by the firewall? If someone can tell me what filter I need to create to capture only the packets to/from one application (gobby) I might be able to see it. Otherwise the flood of packets is such that it's like finding a needle in a haystack. When I double-clicked on the address of my FreedomBox I got the expected result: "The server certificate is not trusted. The certificate has expired" The first part is expected, after all the FreedomBox certificate is self-signed, but it shouldn't be fatal. The second one is puzzling. I also got a 28 packet exchange betweein gobby and the FreedomBox, which is included it its totality below, but packets 14 and 15 are interesting: Change Cipher Spec. Inside the "Transport Layer Security" is this: TLSv1.3 Record Layer: Change Cipher Spec Protocol: Change Cipher Spec Content Type: Change Cipher Spec (20) Version: TLS 1.2 (0x0303) Length: 1 Change Cipher Spec Message Might this be the cause of the problem? Has the FreedomBox recently stopped dealing with TLS 1.2? Might there be some mismatch that is reported as the certificate having expired? There are no error packets. The address beginning with 192.168 is that of the internal computer where gobby is running, the one beginning with 69.141 is the outside interface of the FreedomBox. The application data is encrypted, so no way to make sense of it. It is also interesting that in the data of packet 4 there is a reference to "xmlns=jabber client" and "smlns:stream="http://etherx.jabber.org/streams" and "to=<my domain>.freedombox.rocks" This brings up 2 interesting questions: Why is communication between my local gobby and the gobby server on the FreedomBox even attempting to contact "etherx.jabber.org, or at the very least why is that web address there? and is there some bug that is using certificates for both ejabberd (which I have installed) and infinoted? Disabling ejabberd has no effect. There is also a port 37794 in this log. What is the purpose of it? Might it be blocked by the firewall? Here is the complete wireshark output: It is best seen on a wide window. No. Time Source Destination Protocol Length Info 1 0.000000000 192.168.xxx.x 69.141.xxx.xxx TCP 74 37794 → 6523 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=406399553 TSecr=0 WS=256 Frame 1: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 0, Len: 0 No. Time Source Destination Protocol Length Info 2 0.000560068 69.141.xxx.xxx 192.168.xxx.x TCP 74 6523 → 37794 [SYN, ACK] Seq=0 Ack=1 Win=65160 Len=0 MSS=1460 SACK_PERM=1 TSval=2418487241 TSecr=406399553 WS=128 Frame 2: 74 bytes on wire (592 bits), 74 bytes captured (592 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 0, Ack: 1, Len: 0 No. Time Source Destination Protocol Length Info 3 0.000576699 192.168.xxx.x 69.141.xxx.xxx TCP 66 37794 → 6523 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=406399553 TSecr=2418487241 Frame 3: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 1, Ack: 1, Len: 0 No. Time Source Destination Protocol Length Info 4 0.000661234 192.168.xxx.x 69.141.xxx.xxx TCP 193 37794 → 6523 [PSH, ACK] Seq=1 Ack=1 Win=64256 Len=127 TSval=406399553 TSecr=2418487241 Frame 4: 193 bytes on wire (1544 bits), 193 bytes captured (1544 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 1, Ack: 1, Len: 127 Data (127 bytes) 0000 3c 73 74 72 65 61 6d 3a 73 74 72 65 61 6d 20 76 <stream:stream v 0010 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 78 6d 6c ersion="1.0" xml 0020 6e 73 3d 22 6a 61 62 62 65 72 3a 63 6c 69 65 6e ns="jabber:clien 0030 74 22 20 78 6d 6c 6e 73 3a 73 74 72 65 61 6d 3d t" xmlns:stream= 0040 22 68 74 74 70 3a 2f 2f 65 74 68 65 72 78 2e 6a "http://etherx.j 0050 61 62 62 65 72 2e 6f 72 67 2f 73 74 72 65 61 6d abber.org/stream 0060 73 22 20 74 6f 3d 22 78 79 7a 7a 79 2e 66 72 65 s" to="mydom.fre 0070 65 64 6f 6d 62 6f 78 2e 72 6f 63 6b 73 22 3e edombox.rocks"> No. Time Source Destination Protocol Length Info 5 0.000937167 69.141.xxx.xxx 192.168.xxx.x TCP 66 6523 → 37794 [ACK] Seq=1 Ack=128 Win=65152 Len=0 TSval=2418487241 TSecr=406399553 Frame 5: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 1, Ack: 128, Len: 0 No. Time Source Destination Protocol Length Info 6 0.002649512 69.141.xxx.xxx 192.168.xxx.x TCP 176 6523 → 37794 [PSH, ACK] Seq=1 Ack=128 Win=65152 Len=110 TSval=2418487243 TSecr=406399553 Frame 6: 176 bytes on wire (1408 bits), 176 bytes captured (1408 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 1, Ack: 128, Len: 110 Data (110 bytes) 0000 3c 73 74 72 65 61 6d 3a 73 74 72 65 61 6d 20 78 <stream:stream x 0010 6d 6c 6e 73 3a 73 74 72 65 61 6d 3d 22 68 74 74 mlns:stream="htt 0020 70 3a 2f 2f 65 74 68 65 72 78 2e 6a 61 62 62 65 p://etherx.jabbe 0030 72 2e 6f 72 67 2f 73 74 72 65 61 6d 73 22 20 78 r.org/streams" x 0040 6d 6c 6e 73 3d 22 6a 61 62 62 65 72 3a 63 6c 69 mlns="jabber:cli 0050 65 6e 74 22 20 76 65 72 73 69 6f 6e 3d 22 31 2e ent" version="1. 0060 30 22 20 66 72 6f 6d 3d 22 66 62 78 22 3e 0" from="fbx"> No. Time Source Destination Protocol Length Info 7 0.002655939 192.168.xxx.x 69.141.xxx.xxx TCP 66 37794 → 6523 [ACK] Seq=128 Ack=111 Win=64256 Len=0 TSval=406399555 TSecr=2418487243 Frame 7: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 128, Ack: 111, Len: 0 No. Time Source Destination Protocol Length Info 8 0.003014500 69.141.xxx.xxx 192.168.xxx.x TCP 271 6523 → 37794 [PSH, ACK] Seq=111 Ack=128 Win=65152 Len=205 TSval=2418487243 TSecr=406399555 Frame 8: 271 bytes on wire (2168 bits), 271 bytes captured (2168 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 111, Ack: 128, Len: 205 Data (205 bytes) 0000 3c 73 74 72 65 61 6d 3a 66 65 61 74 75 72 65 73 <stream:features 0010 3e 3c 73 74 61 72 74 74 6c 73 20 78 6d 6c 6e 73 ><starttls xmlns 0020 3d 22 75 72 6e 3a 69 65 74 66 3a 70 61 72 61 6d ="urn:ietf:param 0030 73 3a 78 6d 6c 3a 6e 73 3a 78 6d 70 70 2d 74 6c s:xml:ns:xmpp-tl 0040 73 22 3e 3c 72 65 71 75 69 72 65 64 2f 3e 3c 2f s"><required/></ 0050 73 74 61 72 74 74 6c 73 3e 3c 6d 65 63 68 61 6e starttls><mechan 0060 69 73 6d 73 20 78 6d 6c 6e 73 3d 22 75 72 6e 3a isms xmlns="urn: 0070 69 65 74 66 3a 70 61 72 61 6d 73 3a 78 6d 6c 3a ietf:params:xml: 0080 6e 73 3a 78 6d 70 70 2d 73 61 73 6c 22 3e 3c 6d ns:xmpp-sasl"><m 0090 65 63 68 61 6e 69 73 6d 3e 41 4e 4f 4e 59 4d 4f echanism>ANONYMO 00a0 55 53 3c 2f 6d 65 63 68 61 6e 69 73 6d 3e 3c 2f US</mechanism></ 00b0 6d 65 63 68 61 6e 69 73 6d 73 3e 3c 2f 73 74 72 mechanisms></str 00c0 65 61 6d 3a 66 65 61 74 75 72 65 73 3e eam:features> No. Time Source Destination Protocol Length Info 9 0.003035749 192.168.xxx.x 69.141.xxx.xxx TCP 66 37794 → 6523 [ACK] Seq=128 Ack=316 Win=64256 Len=0 TSval=406399556 TSecr=2418487243 Frame 9: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 128, Ack: 316, Len: 0 No. Time Source Destination Protocol Length Info 10 0.003086045 192.168.xxx.x 69.141.xxx.xxx TCP 117 37794 → 6523 [PSH, ACK] Seq=128 Ack=316 Win=64256 Len=51 TSval=406399556 TSecr=2418487243 Frame 10: 117 bytes on wire (936 bits), 117 bytes captured (936 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 128, Ack: 316, Len: 51 Data (51 bytes) 0000 3c 73 74 61 72 74 74 6c 73 20 78 6d 6c 6e 73 3d <starttls xmlns= 0010 22 75 72 6e 3a 69 65 74 66 3a 70 61 72 61 6d 73 "urn:ietf:params 0020 3a 78 6d 6c 3a 6e 73 3a 78 6d 70 70 2d 74 6c 73 :xml:ns:xmpp-tls 0030 22 2f 3e "/> No. Time Source Destination Protocol Length Info 11 0.003700539 69.141.xxx.xxx 192.168.xxx.x TCP 116 6523 → 37794 [PSH, ACK] Seq=316 Ack=179 Win=65152 Len=50 TSval=2418487244 TSecr=406399556 Frame 11: 116 bytes on wire (928 bits), 116 bytes captured (928 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 316, Ack: 179, Len: 50 Data (50 bytes) 0000 3c 70 72 6f 63 65 65 64 20 78 6d 6c 6e 73 3d 22 <proceed xmlns=" 0010 75 72 6e 3a 69 65 74 66 3a 70 61 72 61 6d 73 3a urn:ietf:params: 0020 78 6d 6c 3a 6e 73 3a 78 6d 70 70 2d 74 6c 73 22 xml:ns:xmpp-tls" 0030 2f 3e /> No. Time Source Destination Protocol Length Info 12 0.013845555 192.168.xxx.x 69.141.xxx.xxx TLSv1.3 439 Client Hello Frame 12: 439 bytes on wire (3512 bits), 439 bytes captured (3512 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 179, Ack: 366, Len: 373 Transport Layer Security No. Time Source Destination Protocol Length Info 13 0.016952613 69.141.xxx.xxx 192.168.xxx.x TLSv1.3 226 Server Hello Frame 13: 226 bytes on wire (1808 bits), 226 bytes captured (1808 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 366, Ack: 552, Len: 160 Transport Layer Security No. Time Source Destination Protocol Length Info 14 0.017399899 192.168.xxx.x 69.141.xxx.xxx TLSv1.3 72 Change Cipher Spec Frame 14: 72 bytes on wire (576 bits), 72 bytes captured (576 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 552, Ack: 526, Len: 6 Transport Layer Security No. Time Source Destination Protocol Length Info 15 0.017818150 69.141.xxx.xxx 192.168.xxx.x TLSv1.3 72 Change Cipher Spec Frame 15: 72 bytes on wire (576 bits), 72 bytes captured (576 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 526, Ack: 558, Len: 6 Transport Layer Security No. Time Source Destination Protocol Length Info 16 0.064447132 192.168.xxx.x 69.141.xxx.xxx TCP 66 37794 → 6523 [ACK] Seq=558 Ack=532 Win=64256 Len=0 TSval=406399617 TSecr=2418487258 Frame 16: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 558, Ack: 532, Len: 0 No. Time Source Destination Protocol Length Info 17 0.109105858 69.141.xxx.xxx 192.168.xxx.x TLSv1.3 100 Application Data Frame 17: 100 bytes on wire (800 bits), 100 bytes captured (800 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 532, Ack: 558, Len: 34 Transport Layer Security No. Time Source Destination Protocol Length Info 18 0.109123027 192.168.xxx.x 69.141.xxx.xxx TCP 66 37794 → 6523 [ACK] Seq=558 Ack=566 Win=64256 Len=0 TSval=406399662 TSecr=2418487349 Frame 18: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 558, Ack: 566, Len: 0 No. Time Source Destination Protocol Length Info 19 0.109187789 69.141.xxx.xxx 192.168.xxx.x TLSv1.3 1514 Application Data Frame 19: 1514 bytes on wire (12112 bits), 1514 bytes captured (12112 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 566, Ack: 558, Len: 1448 Transport Layer Security No. Time Source Destination Protocol Length Info 20 0.109197755 192.168.xxx.x 69.141.xxx.xxx TCP 66 37794 → 6523 [ACK] Seq=558 Ack=2014 Win=64256 Len=0 TSval=406399662 TSecr=2418487349 Frame 20: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 558, Ack: 2014, Len: 0 No. Time Source Destination Protocol Length Info 21 0.109474614 69.141.xxx.xxx 192.168.xxx.x TLSv1.3 500 Application Data, Application Data Frame 21: 500 bytes on wire (4000 bits), 500 bytes captured (4000 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 2014, Ack: 558, Len: 434 [2 Reassembled TCP Segments (542 bytes): #19(182), #21(360)] Transport Layer Security Transport Layer Security No. Time Source Destination Protocol Length Info 22 0.109484011 192.168.xxx.x 69.141.xxx.xxx TCP 66 37794 → 6523 [ACK] Seq=558 Ack=2448 Win=64256 Len=0 TSval=406399662 TSecr=2418487349 Frame 22: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 558, Ack: 2448, Len: 0 No. Time Source Destination Protocol Length Info 23 0.109871668 192.168.xxx.x 69.141.xxx.xxx TLSv1.3 140 Application Data Frame 23: 140 bytes on wire (1120 bits), 140 bytes captured (1120 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 558, Ack: 2448, Len: 74 Transport Layer Security No. Time Source Destination Protocol Length Info 24 0.153146630 69.141.xxx.xxx 192.168.xxx.x TCP 66 6523 → 37794 [ACK] Seq=2448 Ack=632 Win=64896 Len=0 TSval=2418487393 TSecr=406399663 Frame 24: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 2448, Ack: 632, Len: 0 No. Time Source Destination Protocol Length Info 25 0.153168177 192.168.xxx.x 69.141.xxx.xxx TLSv1.3 90 Application Data Frame 25: 90 bytes on wire (720 bits), 90 bytes captured (720 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 632, Ack: 2448, Len: 24 Transport Layer Security No. Time Source Destination Protocol Length Info 26 0.153640323 69.141.xxx.xxx 192.168.xxx.x TCP 66 6523 → 37794 [ACK] Seq=2448 Ack=656 Win=64896 Len=0 TSval=2418487394 TSecr=406399706 Frame 26: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 2448, Ack: 656, Len: 0 No. Time Source Destination Protocol Length Info 27 0.154652601 69.141.xxx.xxx 192.168.xxx.x TCP 66 6523 → 37794 [FIN, ACK] Seq=2448 Ack=656 Win=64896 Len=0 TSval=2418487395 TSecr=406399706 Frame 27: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa), Dst: Pegatron_20:9e:4e (60:02:92:20:9e:4e) Internet Protocol Version 4, Src: 69.141.xxx.xxx, Dst: 192.168.xxx.x Transmission Control Protocol, Src Port: 6523, Dst Port: 37794, Seq: 2448, Ack: 656, Len: 0 No. Time Source Destination Protocol Length Info 28 0.196470840 192.168.xxx.x 69.141.xxx.xxx TCP 66 37794 → 6523 [ACK] Seq=656 Ack=2449 Win=64256 Len=0 TSval=406399749 TSecr=2418487395 Frame 28: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface enp5s0, id 0 Ethernet II, Src: Pegatron_20:9e:4e (60:02:92:20:9e:4e), Dst: PCEngine_3f:92:aa (00:0d:b9:3f:92:aa) Internet Protocol Version 4, Src: 192.168.xxx.x, Dst: 69.141.xxx.xxx Transmission Control Protocol, Src Port: 37794, Dst Port: 6523, Seq: 656, Ack: 2449, Len: 0 _______________________________________________ Freedombox-discuss mailing list Freedombox-discuss@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/freedombox-discuss