Hi Nikos,
Thanks for your (and Dan's) response.
On 13/07/2018 19:26, Nikos Mavrogiannopoulos wrote:
On Thu, Jul 12, 2018 at 5:23 PM, Gareth Williams
<[email protected]> wrote:
Hi,
I've just installed and configured ocserv. I'm using openconnect as a
client on two Windows 10 laptops. If I attempt from, say, a hotel xDSL
network, I connect and am able to access my lab environment remotely.
However, if I attempt to connect by tethering the laptops over a mobile
network, it fails with:
SSL connection failure: Error in the pull function.
I've tried connecting with gnutls-cli and this fails with:
*** Fatal error: The TLS connection was non-properly terminated.
*** Handshake has failed: The TLS connection was non-properly terminated.
If I use gnutls-cli-debug, it tells me that it it has to disable all SSL and
TLS before exiting with:
That's interesting. Which version of gnutls is that
This is gnutls v3.5.8 on Debian 9 (and I've tried Raspbian too)
and what do you
see if you try to connect with gnutls-cli?
gnutls-cli --no-ca-verification vpn.my.domain.name:443
Processed 166 CA certificate(s).
Resolving 'vpn.my.domain.name:443'...
Connecting to '146.xxx.xxx.139:443'...
*** Fatal error: The TLS connection was non-properly terminated.
*** handshake has failed: The TLS connection was non-properly terminated.
Do you have the capture of
a failed openconnect session to send me?
All the following captures are over the mobile network.
This is a capture of traffic at the client (running openconnect):
--------------------------------------------------------------------------->8-----------------------------------------------------------------------
No. Time Source Destination Protocol Length Info
14 4.259292 192.168.43.116 146.xxx.xxx.139 TCP
66 61667 → 443 [SYN] Seq=773288135 Win=64240 Len=0 MSS=1460 WS=256
SACK_PERM=1
Frame 14: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on
interface 0
Ethernet II, Src: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e), Dst:
MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2)
Internet Protocol Version 4, Src: 192.168.43.116, Dst: 146.xxx.xxx.139
Transmission Control Protocol, Src Port: 61667, Dst Port: 443, Seq:
773288135, Len: 0
Source Port: 61667
Destination Port: 443
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 773288135
Acknowledgment number: 0
1000 .... = Header Length: 32 bytes (8)
Flags: 0x002 (SYN)
Window size value: 64240
[Calculated window size: 64240]
Checksum: 0xbf31 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
Options: (12 bytes), Maximum segment size, No-Operation (NOP),
Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
No. Time Source Destination Protocol Length
Info
15 4.306515 146.xxx.xxx.139 192.168.43.116 TCP
66 443 → 61667 [SYN, ACK] Seq=688983551 Ack=773288136 Win=29200
Len=0 MSS=1358 SACK_PERM=1 WS=64
Frame 15: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on
interface 0
Ethernet II, Src: MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2),
Dst: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e)
Internet Protocol Version 4, Src: 146.xxx.xxx.139, Dst: 192.168.43.116
Transmission Control Protocol, Src Port: 443, Dst Port: 61667, Seq:
688983551, Ack: 773288136, Len: 0
Source Port: 443
Destination Port: 61667
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 688983551
Acknowledgment number: 773288136
1000 .... = Header Length: 32 bytes (8)
Flags: 0x012 (SYN, ACK)
Window size value: 29200
[Calculated window size: 29200]
Checksum: 0x1159 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
Options: (12 bytes), Maximum segment size, No-Operation (NOP),
No-Operation (NOP), SACK permitted, No-Operation (NOP), Window scale
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length
Info
16 4.306801 192.168.43.116 146.xxx.xxx.139 TCP
54 61667 → 443 [ACK] Seq=773288136 Ack=688983552 Win=66304 Len=0
Frame 16: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on
interface 0
Ethernet II, Src: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e), Dst:
MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2)
Internet Protocol Version 4, Src: 192.168.43.116, Dst: 146.xxx.xxx.139
Transmission Control Protocol, Src Port: 61667, Dst Port: 443, Seq:
773288136, Ack: 688983552, Len: 0
Source Port: 61667
Destination Port: 443
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 773288136
Acknowledgment number: 688983552
0101 .... = Header Length: 20 bytes (5)
Flags: 0x010 (ACK)
Window size value: 259
[Calculated window size: 66304]
[Window size scaling factor: 256]
Checksum: 0xc2d1 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length
Info
17 4.308578 192.168.43.116 146.xxx.xxx.139 TLSv1
313 Client Hello
Frame 17: 313 bytes on wire (2504 bits), 313 bytes captured (2504 bits)
on interface 0
Ethernet II, Src: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e), Dst:
MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2)
Internet Protocol Version 4, Src: 192.168.43.116, Dst: 146.xxx.xxx.139
Transmission Control Protocol, Src Port: 61667, Dst Port: 443, Seq:
773288136, Ack: 688983552, Len: 259
Source Port: 61667
Destination Port: 443
[Stream index: 1]
[TCP Segment Len: 259]
Sequence number: 773288136
[Next sequence number: 773288395]
Acknowledgment number: 688983552
0101 .... = Header Length: 20 bytes (5)
Flags: 0x018 (PSH, ACK)
Window size value: 259
[Calculated window size: 66304]
[Window size scaling factor: 256]
Checksum: 0xf790 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
TCP payload (259 bytes)
Secure Sockets Layer
No. Time Source Destination Protocol Length
Info
18 4.346466 146.xxx.xxx.139 192.168.43.116 TCP
54 443 → 61667 [RST, ACK] Seq=688983552 Ack=773288395 Win=2055680 Len=0
Frame 18: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on
interface 0
Ethernet II, Src: MS-NLB-PhysServer-26_11:f5:41:e2 (02:1a:11:f5:41:e2),
Dst: IntelCor_9d:6f:3e (c8:21:58:9d:6f:3e)
Internet Protocol Version 4, Src: 146.xxx.xxx.139, Dst: 192.168.43.116
Transmission Control Protocol, Src Port: 443, Dst Port: 61667, Seq:
688983552, Ack: 773288395, Len: 0
Source Port: 443
Destination Port: 61667
[Stream index: 1]
[TCP Segment Len: 0]
Sequence number: 688983552
Acknowledgment number: 773288395
0101 .... = Header Length: 20 bytes (5)
Flags: 0x014 (RST, ACK)
Window size value: 32120
[Calculated window size: 2055680]
[Window size scaling factor: 64]
Checksum: 0x4555 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
--------------------------------------------------------------------------->8-----------------------------------------------------------------------
This is a capture at the server end for the above:
--------------------------------------------------------------------------->8-----------------------------------------------------------------------
No. Time Source Destination Protocol Length Info
1 0.000000 92.xx.xxx.98 172.28.2.20 TCP
68 37074 → 443 [SYN] Seq=773288135 Win=64240 Len=0 MSS=1358 WS=256
SACK_PERM=1
Frame 1: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 92.xx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37074, Dst Port: 443, Seq:
773288135, Len: 0
Source Port: 37074
Destination Port: 443
[Stream index: 0]
[TCP Segment Len: 0]
Sequence number: 773288135
Acknowledgment number: 0
1000 .... = Header Length: 32 bytes (8)
Flags: 0x002 (SYN)
Window size value: 64240
[Calculated window size: 64240]
Checksum: 0x405e [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
Options: (12 bytes), Maximum segment size, No-Operation (NOP),
Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
No. Time Source Destination Protocol Length
Info
2 0.000187 172.28.2.20 92.xx.xxx.98 TCP
68 443 → 37074 [SYN, ACK] Seq=688983551 Ack=773288136 Win=29200
Len=0 MSS=1460 SACK_PERM=1 WS=64
Frame 2: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37074, Seq:
688983551, Ack: 773288136, Len: 0
Source Port: 443
Destination Port: 37074
[Stream index: 0]
[TCP Segment Len: 0]
Sequence number: 688983551
Acknowledgment number: 773288136
1000 .... = Header Length: 32 bytes (8)
Flags: 0x012 (SYN, ACK)
Window size value: 29200
[Calculated window size: 29200]
Checksum: 0x02e2 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
Options: (12 bytes), Maximum segment size, No-Operation (NOP),
No-Operation (NOP), SACK permitted, No-Operation (NOP), Window scale
[SEQ/ACK analysis]
No. Time Source Destination Protocol Length
Info
3 0.049901 92.xx.xxx.98 172.28.2.20 TCP
62 37074 → 443 [ACK] Seq=773288136 Ack=688983552 Win=66304 Len=0
Frame 3: 62 bytes on wire (496 bits), 62 bytes captured (496 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 92.xx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37074, Dst Port: 443, Seq:
773288136, Ack: 688983552, Len: 0
Source Port: 37074
Destination Port: 443
[Stream index: 0]
[TCP Segment Len: 0]
Sequence number: 773288136
Acknowledgment number: 688983552
0101 .... = Header Length: 20 bytes (5)
Flags: 0x010 (ACK)
Window size value: 259
[Calculated window size: 66304]
[Window size scaling factor: 256]
Checksum: 0x4398 [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
[SEQ/ACK analysis]
VSS-Monitoring ethernet trailer, Source Port: 0
No. Time Source Destination Protocol Length
Info
4 0.059984 92.xx.xxx.98 172.28.2.20 TCP
62 37074 → 443 [RST, ACK] Seq=773288136 Ack=688983552 Win=8222720 Len=0
Frame 4: 62 bytes on wire (496 bits), 62 bytes captured (496 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 92.xx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37074, Dst Port: 443, Seq:
773288136, Ack: 688983552, Len: 0
Source Port: 37074
Destination Port: 443
[Stream index: 0]
[TCP Segment Len: 0]
Sequence number: 773288136
Acknowledgment number: 688983552
0101 .... = Header Length: 20 bytes (5)
Flags: 0x014 (RST, ACK)
Window size value: 32120
[Calculated window size: 8222720]
[Window size scaling factor: 256]
Checksum: 0xc71e [unverified]
[Checksum Status: Unverified]
Urgent pointer: 0
VSS-Monitoring ethernet trailer, Source Port: 0
--------------------------------------------------------------------------->8-----------------------------------------------------------------------
This is a capture at the server end, but this time when running gnutls-cli:
--------------------------------------------------------------------------->8-----------------------------------------------------------------------
No. Time Source Destination Protocol Length Info
1 0.000000 92.xxx.xxx.98 172.28.2.20 TCP
66 37206 → 443 [SYN] Seq=4184378929 Win=64240 Len=0 MSS=1358 WS=256
SACK_PERM=1
Frame 1: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37206, Dst Port: 443, Seq:
4184378929, Len: 0
No. Time Source Destination Protocol Length
Info
2 0.000185 172.28.2.20 92.xxx.xxx.98 TCP
66 443 → 37206 [SYN, ACK] Seq=783771790 Ack=4184378930 Win=29200
Len=0 MSS=1460 SACK_PERM=1 WS=64
Frame 2: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst:
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37206, Seq:
783771790, Ack: 4184378930, Len: 0
No. Time Source Destination Protocol Length
Info
3 0.048919 92.xxx.xxx.98 172.28.2.20 TCP
60 37206 → 443 [ACK] Seq=4184378930 Ack=783771791 Win=66304 Len=0
Frame 3: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37206, Dst Port: 443, Seq:
4184378930, Ack: 783771791, Len: 0
No. Time Source Destination Protocol Length
Info
4 0.069010 92.xxx.xxx.98 172.28.2.20 TCP
60 37206 → 443 [RST, ACK] Seq=4184378930 Ack=783771791 Win=8222720 Len=0
Frame 4: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37206, Dst Port: 443, Seq:
4184378930, Ack: 783771791, Len: 0
--------------------------------------------------------------------------->8-----------------------------------------------------------------------
Finally, a capture at the server end, when successfully connecting using
OpenSSL's s_client:
--------------------------------------------------------------------------->8-----------------------------------------------------------------------
No. Time Source Destination Protocol Length Info
1 0.000000 92.xxx.xxx.98 172.28.2.20 TCP
66 37213 → 443 [SYN] Seq=1304591944 Win=64240 Len=0 MSS=1358 WS=256
SACK_PERM=1
Frame 1: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq:
1304591944, Len: 0
No. Time Source Destination Protocol Length
Info
2 0.000175 172.28.2.20 92.xxx.xxx.98 TCP
66 443 → 37213 [SYN, ACK] Seq=55774611 Ack=1304591945 Win=29200
Len=0 MSS=1460 SACK_PERM=1 WS=64
Frame 2: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst:
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq:
55774611, Ack: 1304591945, Len: 0
No. Time Source Destination Protocol Length
Info
3 0.050807 92.xxx.xxx.98 172.28.2.20 TCP
60 37213 → 443 [ACK] Seq=1304591945 Ack=55774612 Win=66304 Len=0
Frame 3: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq:
1304591945, Ack: 55774612, Len: 0
No. Time Source Destination Protocol Length
Info
4 0.059703 92.xxx.xxx.98 172.28.2.20 TLSv1.2
230 Client Hello
Frame 4: 230 bytes on wire (1840 bits), 230 bytes captured (1840 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq:
1304591945, Ack: 55774612, Len: 176
Secure Sockets Layer
No. Time Source Destination Protocol Length
Info
5 0.059834 172.28.2.20 92.xxx.xxx.98 TCP
54 443 → 37213 [ACK] Seq=55774612 Ack=1304592121 Win=30272 Len=0
Frame 5: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst:
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq:
55774612, Ack: 1304592121, Len: 0
No. Time Source Destination Protocol Length
Info
6 0.163836 172.28.2.20 92.xxx.xxx.98 TLSv1.2
1412 Server Hello
Frame 6: 1412 bytes on wire (11296 bits), 1412 bytes captured (11296 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst:
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq:
55774612, Ack: 1304592121, Len: 1358
Secure Sockets Layer
No. Time Source Destination Protocol Length
Info
7 0.164113 172.28.2.20 92.xxx.xxx.98 TCP
1412 443 → 37213 [ACK] Seq=55775970 Ack=1304592121 Win=30272 Len=1358
[TCP segment of a reassembled PDU]
Frame 7: 1412 bytes on wire (11296 bits), 1412 bytes captured (11296 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst:
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq:
55775970, Ack: 1304592121, Len: 1358
No. Time Source Destination Protocol Length
Info
8 0.164303 172.28.2.20 92.xxx.xxx.98 TCP
1412 443 → 37213 [ACK] Seq=55777328 Ack=1304592121 Win=30272 Len=1358
[TCP segment of a reassembled PDU]
Frame 8: 1412 bytes on wire (11296 bits), 1412 bytes captured (11296 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst:
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq:
55777328, Ack: 1304592121, Len: 1358
No. Time Source Destination Protocol Length
Info
9 0.164646 172.28.2.20 92.xxx.xxx.98 TLSv1.2
686 Certificate, Server Key Exchange, Server Hello Done
Frame 9: 686 bytes on wire (5488 bits), 686 bytes captured (5488 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst:
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq:
55778686, Ack: 1304592121, Len: 632
[4 Reassembled TCP Segments (4267 bytes): #6(1266), #7(1358), #8(1358),
#9(285)]
Secure Sockets Layer
Secure Sockets Layer
No. Time Source Destination Protocol Length
Info
10 0.220003 92.xxx.xxx.98 172.28.2.20 TCP
60 37213 → 443 [ACK] Seq=1304592121 Ack=55777328 Win=63744 Len=0
Frame 10: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq:
1304592121, Ack: 55777328, Len: 0
No. Time Source Destination Protocol Length
Info
11 0.230229 92.xxx.xxx.98 172.28.2.20 TCP
60 [TCP Window Update] 37213 → 443 [ACK] Seq=1304592121 Ack=55777328
Win=66304 Len=0
Frame 11: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq:
1304592121, Ack: 55777328, Len: 0
No. Time Source Destination Protocol Length
Info
12 0.230274 92.xxx.xxx.98 172.28.2.20 TCP
60 37213 → 443 [ACK] Seq=1304592121 Ack=55779318 Win=65792 Len=0
Frame 12: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq:
1304592121, Ack: 55779318, Len: 0
No. Time Source Destination Protocol Length
Info
13 0.259598 92.xxx.xxx.98 172.28.2.20 TLSv1.2
180 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
Frame 13: 180 bytes on wire (1440 bits), 180 bytes captured (1440 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq:
1304592121, Ack: 55779318, Len: 126
Secure Sockets Layer
No. Time Source Destination Protocol Length
Info
14 0.259707 172.28.2.20 92.xxx.xxx.98 TCP
54 443 → 37213 [ACK] Seq=55779318 Ack=1304592247 Win=30272 Len=0
Frame 14: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst:
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq:
55779318, Ack: 1304592247, Len: 0
No. Time Source Destination Protocol Length
Info
15 0.276531 172.28.2.20 92.xxx.xxx.98 TLSv1.2
105 Change Cipher Spec, Encrypted Handshake Message
Frame 15: 105 bytes on wire (840 bits), 105 bytes captured (840 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst:
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq:
55779318, Ack: 1304592247, Len: 51
Secure Sockets Layer
No. Time Source Destination Protocol Length
Info
16 0.370238 92.xxx.xxx.98 172.28.2.20 TCP
60 37213 → 443 [ACK] Seq=1304592247 Ack=55779369 Win=65792 Len=0
Frame 16: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq:
1304592247, Ack: 55779369, Len: 0
No. Time Source Destination Protocol Length
Info
17 1.621503 92.xxx.xxx.98 172.28.2.20 TCP
60 37213 → 443 [FIN, ACK] Seq=1304592247 Ack=55779369 Win=65792 Len=0
Frame 17: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq:
1304592247, Ack: 55779369, Len: 0
No. Time Source Destination Protocol Length
Info
18 1.630448 172.28.2.20 92.xxx.xxx.98 TCP
54 443 → 37213 [FIN, ACK] Seq=55779369 Ack=1304592248 Win=30272 Len=0
Frame 18: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
Ethernet II, Src: Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8), Dst:
SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9)
Internet Protocol Version 4, Src: 172.28.2.20, Dst: 92.xxx.xxx.98
Transmission Control Protocol, Src Port: 443, Dst Port: 37213, Seq:
55779369, Ack: 1304592248, Len: 0
No. Time Source Destination Protocol Length
Info
19 1.680275 92.xxx.xxx.98 172.28.2.20 TCP
60 37213 → 443 [ACK] Seq=1304592248 Ack=55779370 Win=65792 Len=0
Frame 19: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
Ethernet II, Src: SpeedDra_0f:45:f9 (00:13:3b:0f:45:f9), Dst:
Raspberr_78:ad:b8 (b8:27:eb:78:ad:b8)
Internet Protocol Version 4, Src: 92.xxx.xxx.98, Dst: 172.28.2.20
Transmission Control Protocol, Src Port: 37213, Dst Port: 443, Seq:
1304592248, Ack: 55779370, Len: 0
--------------------------------------------------------------------------->8-----------------------------------------------------------------------
I hope this is enough information.
Kind regards,
Gareth
_______________________________________________
openconnect-devel mailing list
[email protected]
http://lists.infradead.org/mailman/listinfo/openconnect-devel