Hi Nikos,

Thanks for your (and Dan's) response.

On 13/07/2018 19:26, Nikos Mavrogiannopoulos wrote:
On Thu, Jul 12, 2018 at 5:23 PM, Gareth Williams
<[email protected]> wrote:
Hi,

I've just installed and configured ocserv.  I'm using openconnect as a
client on two Windows 10 laptops.  If I attempt from, say, a hotel xDSL
network, I connect and am able to access my lab environment remotely.

However, if I attempt to connect by tethering the laptops over a mobile
network, it fails with:

SSL connection failure: Error in the pull function.

I've tried connecting with gnutls-cli and this fails with:

*** Fatal error: The TLS connection was non-properly terminated.
*** Handshake has failed: The TLS connection was non-properly terminated.

If I use gnutls-cli-debug, it tells me that it it has to disable all SSL and
TLS before exiting with:
That's interesting. Which version of gnutls is that
This is gnutls v3.5.8 on Debian 9 (and I've tried Raspbian too)
and what do you
see if you try to connect with gnutls-cli?

gnutls-cli --no-ca-verification vpn.my.domain.name:443
Processed 166 CA certificate(s).
Resolving 'vpn.my.domain.name:443'...
Connecting to '146.xxx.xxx.139:443'...
*** Fatal error: The TLS connection was non-properly terminated.
*** handshake has failed: The TLS connection was non-properly terminated.

Do you have the capture of
a failed openconnect session to send me?

All the following captures are over the mobile network.

This is a capture of traffic at the client (running openconnect):

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

No.     Time           Source Destination           Protocol Length Info
     14 4.259292       192.168.43.116        146.xxx.xxx.139 TCP      66     61667 → 443 [SYN] Seq=773288135 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1

Frame 14: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface 0 Ethernet II, Src: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e), Dst: MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2)
Internet Protocol Version 4, Src: 192.168.43.116, Dst: 146.xxx.xxx.139
Transmission Control Protocol, Src Port: 61667, Dst Port: 443, Seq: 773288135, Len: 0
    Source Port: 61667
    Destination Port: 443
    [Stream index: 1]
    [TCP Segment Len: 0]
    Sequence number: 773288135
    Acknowledgment number: 0
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x002 (SYN)
    Window size value: 64240
    [Calculated window size: 64240]
    Checksum: 0xbf31 [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted

No.     Time           Source                Destination Protocol Length Info      15 4.306515       146.xxx.xxx.139       192.168.43.116 TCP      66     443 → 61667 [SYN, ACK] Seq=688983551 Ack=773288136 Win=29200 Len=0 MSS=1358 SACK_PERM=1 WS=64

Frame 15: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface 0 Ethernet II, Src: MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2), Dst: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e)
Internet Protocol Version 4, Src: 146.xxx.xxx.139, Dst: 192.168.43.116
Transmission Control Protocol, Src Port: 443, Dst Port: 61667, Seq: 688983551, Ack: 773288136, Len: 0
    Source Port: 443
    Destination Port: 61667
    [Stream index: 1]
    [TCP Segment Len: 0]
    Sequence number: 688983551
    Acknowledgment number: 773288136
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x012 (SYN, ACK)
    Window size value: 29200
    [Calculated window size: 29200]
    Checksum: 0x1159 [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), No-Operation (NOP), SACK permitted, No-Operation (NOP), Window scale
    [SEQ/ACK analysis]

No.     Time           Source                Destination Protocol Length Info      16 4.306801       192.168.43.116        146.xxx.xxx.139 TCP      54     61667 → 443 [ACK] Seq=773288136 Ack=688983552 Win=66304 Len=0

Frame 16: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on interface 0 Ethernet II, Src: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e), Dst: MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2)
Internet Protocol Version 4, Src: 192.168.43.116, Dst: 146.xxx.xxx.139
Transmission Control Protocol, Src Port: 61667, Dst Port: 443, Seq: 773288136, Ack: 688983552, Len: 0
    Source Port: 61667
    Destination Port: 443
    [Stream index: 1]
    [TCP Segment Len: 0]
    Sequence number: 773288136
    Acknowledgment number: 688983552
    0101 .... = Header Length: 20 bytes (5)
    Flags: 0x010 (ACK)
    Window size value: 259
    [Calculated window size: 66304]
    [Window size scaling factor: 256]
    Checksum: 0xc2d1 [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    [SEQ/ACK analysis]

No.     Time           Source                Destination Protocol Length Info      17 4.308578       192.168.43.116        146.xxx.xxx.139 TLSv1    313    Client Hello

Frame 17: 313 bytes on wire (2504 bits), 313 bytes captured (2504 bits) on interface 0 Ethernet II, Src: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e), Dst: MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2)
Internet Protocol Version 4, Src: 192.168.43.116, Dst: 146.xxx.xxx.139
Transmission Control Protocol, Src Port: 61667, Dst Port: 443, Seq: 773288136, Ack: 688983552, Len: 259
    Source Port: 61667
    Destination Port: 443
    [Stream index: 1]
    [TCP Segment Len: 259]
    Sequence number: 773288136
    [Next sequence number: 773288395]
    Acknowledgment number: 688983552
    0101 .... = Header Length: 20 bytes (5)
    Flags: 0x018 (PSH, ACK)
    Window size value: 259
    [Calculated window size: 66304]
    [Window size scaling factor: 256]
    Checksum: 0xf790 [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    [SEQ/ACK analysis]
    TCP payload (259 bytes)
Secure Sockets Layer

No.     Time           Source                Destination Protocol Length Info      18 4.346466       146.xxx.xxx.139       192.168.43.116 TCP      54     443 → 61667 [RST, ACK] Seq=688983552 Ack=773288395 Win=2055680 Len=0

Frame 18: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on interface 0 Ethernet II, Src: MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2), Dst: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e)
Internet Protocol Version 4, Src: 146.xxx.xxx.139, Dst: 192.168.43.116
Transmission Control Protocol, Src Port: 443, Dst Port: 61667, Seq: 688983552, Ack: 773288395, Len: 0
    Source Port: 443
    Destination Port: 61667
    [Stream index: 1]
    [TCP Segment Len: 0]
    Sequence number: 688983552
    Acknowledgment number: 773288395
    0101 .... = Header Length: 20 bytes (5)
    Flags: 0x014 (RST, ACK)
    Window size value: 32120
    [Calculated window size: 2055680]
    [Window size scaling factor: 64]
    Checksum: 0x4555 [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    [SEQ/ACK analysis]

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

This is a capture at the server end for the above:

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

No.     Time           Source Destination           Protocol Length Info
      1 0.000000       92.xx.xxx.98          172.28.2.20 TCP      68     37074 → 443 [SYN] Seq=773288135 Win=64240 Len=0 MSS=1358 WS=256 SACK_PERM=1

Frame 1: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 92.xx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37074, Dst Port: 443, Seq: 773288135, Len: 0
    Source Port: 37074
    Destination Port: 443
    [Stream index: 0]
    [TCP Segment Len: 0]
    Sequence number: 773288135
    Acknowledgment number: 0
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x002 (SYN)
    Window size value: 64240
    [Calculated window size: 64240]
    Checksum: 0x405e [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted

No.     Time           Source                Destination Protocol Length Info       2 0.000187       172.28.2.20           92.xx.xxx.98 TCP      68     443 → 37074 [SYN, ACK] Seq=688983551 Ack=773288136 Win=29200 Len=0 MSS=1460 SACK_PERM=1 WS=64

Frame 2: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37074, Seq: 688983551, Ack: 773288136, Len: 0
    Source Port: 443
    Destination Port: 37074
    [Stream index: 0]
    [TCP Segment Len: 0]
    Sequence number: 688983551
    Acknowledgment number: 773288136
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x012 (SYN, ACK)
    Window size value: 29200
    [Calculated window size: 29200]
    Checksum: 0x02e2 [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), No-Operation (NOP), SACK permitted, No-Operation (NOP), Window scale
    [SEQ/ACK analysis]

No.     Time           Source                Destination Protocol Length Info       3 0.049901       92.xx.xxx.98          172.28.2.20 TCP      62     37074 → 443 [ACK] Seq=773288136 Ack=688983552 Win=66304 Len=0

Frame 3: 62 bytes on wire (496 bits), 62 bytes captured (496 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 92.xx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37074, Dst Port: 443, Seq: 773288136, Ack: 688983552, Len: 0
    Source Port: 37074
    Destination Port: 443
    [Stream index: 0]
    [TCP Segment Len: 0]
    Sequence number: 773288136
    Acknowledgment number: 688983552
    0101 .... = Header Length: 20 bytes (5)
    Flags: 0x010 (ACK)
    Window size value: 259
    [Calculated window size: 66304]
    [Window size scaling factor: 256]
    Checksum: 0x4398 [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    [SEQ/ACK analysis]
VSS-Monitoring ethernet trailer, Source Port: 0

No.     Time           Source                Destination Protocol Length Info       4 0.059984       92.xx.xxx.98          172.28.2.20 TCP      62     37074 → 443 [RST, ACK] Seq=773288136 Ack=688983552 Win=8222720 Len=0

Frame 4: 62 bytes on wire (496 bits), 62 bytes captured (496 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 92.xx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37074, Dst Port: 443, Seq: 773288136, Ack: 688983552, Len: 0
    Source Port: 37074
    Destination Port: 443
    [Stream index: 0]
    [TCP Segment Len: 0]
    Sequence number: 773288136
    Acknowledgment number: 688983552
    0101 .... = Header Length: 20 bytes (5)
    Flags: 0x014 (RST, ACK)
    Window size value: 32120
    [Calculated window size: 8222720]
    [Window size scaling factor: 256]
    Checksum: 0xc71e [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
VSS-Monitoring ethernet trailer, Source Port: 0
--------------------------------------------------------------------------->8-----------------------------------------------------------------------

This is a capture at the server end, but this time when running gnutls-cli:

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

No.     Time           Source Destination           Protocol Length Info
      1 0.000000       92.xxx.xxx.98 172.28.2.20           TCP      66     37206 → 443 [SYN] Seq=4184378929 Win=64240 Len=0 MSS=1358 WS=256 SACK_PERM=1

Frame 1: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37206, Dst Port: 443, Seq: 4184378929, Len: 0

No.     Time           Source                Destination Protocol Length Info       2 0.000185       172.28.2.20 92.xxx.xxx.98          TCP      66     443 → 37206 [SYN, ACK] Seq=783771790 Ack=4184378930 Win=29200 Len=0 MSS=1460 SACK_PERM=1 WS=64

Frame 2: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37206, Seq: 783771790, Ack: 4184378930, Len: 0

No.     Time           Source                Destination Protocol Length Info       3 0.048919       92.xxx.xxx.98 172.28.2.20           TCP      60     37206 → 443 [ACK] Seq=4184378930 Ack=783771791 Win=66304 Len=0

Frame 3: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37206, Dst Port: 443, Seq: 4184378930, Ack: 783771791, Len: 0

No.     Time           Source                Destination Protocol Length Info       4 0.069010       92.xxx.xxx.98 172.28.2.20           TCP      60     37206 → 443 [RST, ACK] Seq=4184378930 Ack=783771791 Win=8222720 Len=0

Frame 4: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37206, Dst Port: 443, Seq: 4184378930, Ack: 783771791, Len: 0
--------------------------------------------------------------------------->8-----------------------------------------------------------------------

Finally, a capture at the server end, when successfully connecting using OpenSSL's s_client:

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

No.     Time           Source Destination           Protocol Length Info
      1 0.000000       92.xxx.xxx.98 172.28.2.20           TCP      66     37213 → 443 [SYN] Seq=1304591944 Win=64240 Len=0 MSS=1358 WS=256 SACK_PERM=1

Frame 1: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 1304591944, Len: 0

No.     Time           Source                Destination Protocol Length Info       2 0.000175       172.28.2.20 92.xxx.xxx.98          TCP      66     443 → 37213 [SYN, ACK] Seq=55774611 Ack=1304591945 Win=29200 Len=0 MSS=1460 SACK_PERM=1 WS=64

Frame 2: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 55774611, Ack: 1304591945, Len: 0

No.     Time           Source                Destination Protocol Length Info       3 0.050807       92.xxx.xxx.98 172.28.2.20           TCP      60     37213 → 443 [ACK] Seq=1304591945 Ack=55774612 Win=66304 Len=0

Frame 3: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 1304591945, Ack: 55774612, Len: 0

No.     Time           Source                Destination Protocol Length Info       4 0.059703       92.xxx.xxx.98 172.28.2.20           TLSv1.2  230    Client Hello

Frame 4: 230 bytes on wire (1840 bits), 230 bytes captured (1840 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 1304591945, Ack: 55774612, Len: 176
Secure Sockets Layer

No.     Time           Source                Destination Protocol Length Info       5 0.059834       172.28.2.20 92.xxx.xxx.98          TCP      54     443 → 37213 [ACK] Seq=55774612 Ack=1304592121 Win=30272 Len=0

Frame 5: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 55774612, Ack: 1304592121, Len: 0

No.     Time           Source                Destination Protocol Length Info       6 0.163836       172.28.2.20 92.xxx.xxx.98          TLSv1.2  1412   Server Hello

Frame 6: 1412 bytes on wire (11296 bits), 1412 bytes captured (11296 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 55774612, Ack: 1304592121, Len: 1358
Secure Sockets Layer

No.     Time           Source                Destination Protocol Length Info       7 0.164113       172.28.2.20 92.xxx.xxx.98          TCP      1412   443 → 37213 [ACK] Seq=55775970 Ack=1304592121 Win=30272 Len=1358 [TCP segment of a reassembled PDU]

Frame 7: 1412 bytes on wire (11296 bits), 1412 bytes captured (11296 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 55775970, Ack: 1304592121, Len: 1358

No.     Time           Source                Destination Protocol Length Info       8 0.164303       172.28.2.20 92.xxx.xxx.98          TCP      1412   443 → 37213 [ACK] Seq=55777328 Ack=1304592121 Win=30272 Len=1358 [TCP segment of a reassembled PDU]

Frame 8: 1412 bytes on wire (11296 bits), 1412 bytes captured (11296 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 55777328, Ack: 1304592121, Len: 1358

No.     Time           Source                Destination Protocol Length Info       9 0.164646       172.28.2.20 92.xxx.xxx.98          TLSv1.2  686    Certificate, Server Key Exchange, Server Hello Done

Frame 9: 686 bytes on wire (5488 bits), 686 bytes captured (5488 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 55778686, Ack: 1304592121, Len: 632 [4 Reassembled TCP Segments (4267 bytes): #6(1266), #7(1358), #8(1358), #9(285)]
Secure Sockets Layer
Secure Sockets Layer

No.     Time           Source                Destination Protocol Length Info      10 0.220003       92.xxx.xxx.98 172.28.2.20           TCP      60     37213 → 443 [ACK] Seq=1304592121 Ack=55777328 Win=63744 Len=0

Frame 10: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 1304592121, Ack: 55777328, Len: 0

No.     Time           Source                Destination Protocol Length Info      11 0.230229       92.xxx.xxx.98 172.28.2.20           TCP      60     [TCP Window Update] 37213 → 443 [ACK] Seq=1304592121 Ack=55777328 Win=66304 Len=0

Frame 11: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 1304592121, Ack: 55777328, Len: 0

No.     Time           Source                Destination Protocol Length Info      12 0.230274       92.xxx.xxx.98 172.28.2.20           TCP      60     37213 → 443 [ACK] Seq=1304592121 Ack=55779318 Win=65792 Len=0

Frame 12: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 1304592121, Ack: 55779318, Len: 0

No.     Time           Source                Destination Protocol Length Info      13 0.259598       92.xxx.xxx.98 172.28.2.20           TLSv1.2  180    Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message

Frame 13: 180 bytes on wire (1440 bits), 180 bytes captured (1440 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 1304592121, Ack: 55779318, Len: 126
Secure Sockets Layer

No.     Time           Source                Destination Protocol Length Info      14 0.259707       172.28.2.20 92.xxx.xxx.98          TCP      54     443 → 37213 [ACK] Seq=55779318 Ack=1304592247 Win=30272 Len=0

Frame 14: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 55779318, Ack: 1304592247, Len: 0

No.     Time           Source                Destination Protocol Length Info      15 0.276531       172.28.2.20 92.xxx.xxx.98          TLSv1.2  105    Change Cipher Spec, Encrypted Handshake Message

Frame 15: 105 bytes on wire (840 bits), 105 bytes captured (840 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 55779318, Ack: 1304592247, Len: 51
Secure Sockets Layer

No.     Time           Source                Destination Protocol Length Info      16 0.370238       92.xxx.xxx.98 172.28.2.20           TCP      60     37213 → 443 [ACK] Seq=1304592247 Ack=55779369 Win=65792 Len=0

Frame 16: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 1304592247, Ack: 55779369, Len: 0

No.     Time           Source                Destination Protocol Length Info      17 1.621503       92.xxx.xxx.98 172.28.2.20           TCP      60     37213 → 443 [FIN, ACK] Seq=1304592247 Ack=55779369 Win=65792 Len=0

Frame 17: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 1304592247, Ack: 55779369, Len: 0

No.     Time           Source                Destination Protocol Length Info      18 1.630448       172.28.2.20 92.xxx.xxx.98          TCP      54     443 → 37213 [FIN, ACK] Seq=55779369 Ack=1304592248 Win=30272 Len=0

Frame 18: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq: 55779369, Ack: 1304592248, Len: 0

No.     Time           Source                Destination Protocol Length Info      19 1.680275       92.xxx.xxx.98 172.28.2.20           TCP      60     37213 → 443 [ACK] Seq=1304592248 Ack=55779370 Win=65792 Len=0

Frame 19: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq: 1304592248, Ack: 55779370, Len: 0

--------------------------------------------------------------------------->8-----------------------------------------------------------------------

I hope this is enough information.

Kind regards,

Gareth



_______________________________________________
openconnect-devel mailing list
[email protected]
http://lists.infradead.org/mailman/listinfo/openconnect-devel

Reply via email to