tcpdump capture: 23:40:52.726909 IP 213.141.147.8.33778 > 212.176.201.162.80: Flags [S], seq 1116163452, win 5840, options [mss 1460,sackOK,TS val 141403 ecr 0,nop,wscale 6], length 0 23:40:52.737227 IP 212.176.201.162.80 > 213.141.147.8.33778: Flags [S.], seq 4019723831, ack 1116163453, win 16384, options [mss 1360,nop,wscale 0,nop,nop,TS val 0 ecr 0,nop,nop,sackOK], length 0 23:40:52.737392 IP 213.141.147.8.33778 > 212.176.201.162.80: Flags [.], ack 1, win 92, options [nop,nop,TS val 141405 ecr 0], length 0 23:40:52.737926 IP 213.141.147.8.33778 > 212.176.201.162.80: Flags [P.], seq 1:113, ack 1, win 92, options [nop,nop,TS val 141405 ecr 0], length 112 23:40:52.749101 IP 212.176.201.162.80 > 213.141.147.8.33778: Flags [P.], seq 1:415, ack 113, win 65423, options [nop,nop,TS val 3503477357 ecr 141403], length 414 23:40:52.749219 IP 213.141.147.8.33778 > 212.176.201.162.80: Flags [.], ack 1, win 92, options [nop,nop,TS val 141408 ecr 0], length 0 23:40:53.002253 IP 213.141.147.8.33778 > 212.176.201.162.80: Flags [P.], seq 1:113, ack 1, win 92, options [nop,nop,TS val 141472 ecr 0], length 112 23:40:53.012252 IP 212.176.201.162.80 > 213.141.147.8.33778: Flags [P.], ack 113, win 65423, options [nop,nop,TS val 0 ecr 141408], length 0 23:40:55.665916 IP 212.176.201.162.80 > 213.141.147.8.33778: Flags [P.], seq 1:415, ack 113, win 65423, options [nop,nop,TS val 3503477387 ecr 141408], length 414 23:40:55.666023 IP 213.141.147.8.33778 > 212.176.201.162.80: Flags [.], ack 1, win 92, options [nop,nop,TS val 142137 ecr 0], length 0 23:40:55.676963 IP 212.176.201.162.80 > 213.141.147.8.33778: Flags [P.], seq 1:415, ack 113, win 65423, options [nop,nop,TS val 3503477387 ecr 142137], length 414 23:40:55.677007 IP 213.141.147.8.33778 > 212.176.201.162.80: Flags [.], ack 1, win 92, options [nop,nop,TS val 142140 ecr 0], length 0 23:41:01.683646 IP 212.176.201.162.80 > 213.141.147.8.33778: Flags [P.], seq 1:415, ack 113, win 65423, options [nop,nop,TS val 3503477447 ecr 142140], length 414 23:41:01.683752 IP 213.141.147.8.33778 > 212.176.201.162.80: Flags [.], ack 1, win 92, options [nop,nop,TS val 143642 ecr 0], length 0
** Attachment added: "An capture of tcp sesssion in libpcap format" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/689886/+attachment/1765125/+files/ugly-windows-rfc1323.pcap ** Bug watch added: Linux Kernel Bug Tracker #24842 http://bugzilla.kernel.org/show_bug.cgi?id=24842 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/689886 Title: Compatibility issue with uggly Windows RFC1323 implementation -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs