From owner-freebsd-net@FreeBSD.ORG Tue Aug 2 09:18:42 2011 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 48453106566C for ; Tue, 2 Aug 2011 09:18:42 +0000 (UTC) (envelope-from andre@freebsd.org) Received: from c00l3r.networx.ch (c00l3r.networx.ch [62.48.2.2]) by mx1.freebsd.org (Postfix) with ESMTP id BD9628FC15 for ; Tue, 2 Aug 2011 09:18:39 +0000 (UTC) Received: (qmail 99912 invoked from network); 2 Aug 2011 08:13:16 -0000 Received: from localhost (HELO [127.0.0.1]) ([127.0.0.1]) (envelope-sender ) by c00l3r.networx.ch (qmail-ldap-1.03) with SMTP for ; 2 Aug 2011 08:13:16 -0000 Message-ID: <4E37C0F2.4080004@freebsd.org> Date: Tue, 02 Aug 2011 11:18:42 +0200 From: Andre Oppermann User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:5.0) Gecko/20110624 Thunderbird/5.0 MIME-Version: 1.0 To: Steven Hartland References: <1F95A4C2D54E4F369830143CBDB5FF86@multiplay.co.uk> In-Reply-To: <1F95A4C2D54E4F369830143CBDB5FF86@multiplay.co.uk> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-net@freebsd.org, lstewart@freebsd.org Subject: Re: tcp failing to recover from a packet loss under 8.2-RELEASE? X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 02 Aug 2011 09:18:42 -0000 On 02.08.2011 03:40, Steven Hartland wrote: > ----- Original Message ----- >> What I believe we're seeing from the tcpdump trace is the >> packet loss on the network results in an unrecoverable tcp >> session. >> >> From my very limited knowledge of tcp, I would expect to see >> the session to recover after receiving the lost packet by >> either a fast retransmit or standard retransmit. >> >> My interpretation of the capture is the packet is indeed resent >> by the sender but that the receiver continues to respond >> with TCP Dup ACK for said missing packet instead of recovering. >> >> Trace is below, which starts from just before the point >> the receiver sees the dropped packet to the point where the sender >> gives up and resets the session. >> >> Is my analysis correct and does it look like this is a tcp >> stack bug? > > Something I've just noticed that might be of note for this is that > the receiving machine seeing the stall seems to be increasing its > "discarded due to memory problems" count at a decent rate:- > > 127187 discarded due to memory problems > the 1 second later during a stall > 127192 discarded due to memory problems > > I believe this is tcps_rcvmemdrop in tcp_reass.c to which there's the > following comment:- > > * XXXLAS: Using sbspace(so->so_rcv) instead of so->so_rcv.sb_hiwat > * should work but causes packets to be dropped when they shouldn't. > > I notice this code is relatively new, so I'm wondering if this may be > something to do with what we're seeing, possibly still dropping packets > it shouldn't? > > @Lawrence apologies' for the direct mail, but I believe you where the > original author this particular change so wondered if you may be > able to shed any light on this? You could be onto something here. Please try this patch: http://people.freebsd.org/~andre/tcp_reass.c-logdebug-20110802.diff You can enable the log output with sysctl net.inet.tcp.log_debug=1 and report the log output (comes at LOG_DEBUG level). -- Andre >> >> tshark -z "proto,colinfo,tcp.seq,tcp.seq" -z "proto,colinfo,tcp.nxtseq,tcp.nxtseq" -r tcp-stall.pcap >> 1 0.000000 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 1449 >> tcp.seq == 1 >> 2 0.000028 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 2897 >> tcp.seq == 1449 >> 3 0.000034 10.10.1.20 -> 10.10.1.10 TCP ssh > 28296 [ACK] Seq=49 Ack=2897 Win=9102 Len=0 >> TSV=1902423651 TSER=261560659 >> tcp.seq == 49 >> 4 0.000051 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 4345 >> tcp.seq == 2897 >> 5 0.000078 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 5793 >> tcp.seq == 4345 >> 6 0.000084 10.10.1.20 -> 10.10.1.10 TCP ssh > 28296 [ACK] Seq=49 Ack=5793 Win=8921 Len=0 >> TSV=1902423651 TSER=261560659 >> tcp.seq == 49 >> 7 0.000100 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 7241 >> tcp.seq == 5793 >> 8 0.000135 10.10.1.10 -> 10.10.1.20 SSH [TCP Previous segment lost] Encrypted request packet >> len=1448 tcp.nxtseq == 10137 >> tcp.seq == 8689 >> 9 0.000147 10.10.1.20 -> 10.10.1.10 TCP ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 >> TSV=1902423652 TSER=261560660 >> SLE=8689 SRE=10137 tcp.seq == 49 >> 10 0.000167 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 11585 >> tcp.seq == 10137 >> 11 0.000173 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#1] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=11585 tcp.seq == 49 >> 12 0.000180 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 13033 >> tcp.seq == 11585 >> 13 0.000186 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#2] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=13033 tcp.seq == 49 >> 14 0.000191 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 14481 >> tcp.seq == 13033 >> 15 0.000197 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#3] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=14481 tcp.seq == 49 >> 16 0.000201 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 15929 >> tcp.seq == 14481 >> 17 0.000209 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#4] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=15929 tcp.seq == 49 >> 18 0.000229 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 17377 >> tcp.seq == 15929 >> 19 0.000237 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#5] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=17377 tcp.seq == 49 >> 20 0.000460 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 18825 >> tcp.seq == 17377 >> 21 0.000469 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#6] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=18825 tcp.seq == 49 >> 22 0.000505 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 20273 >> tcp.seq == 18825 >> 23 0.000511 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#7] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=20273 tcp.seq == 49 >> 24 0.000513 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 21721 >> tcp.seq == 20273 >> 25 0.000519 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#8] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=21721 tcp.seq == 49 >> 26 0.000528 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 23169 >> tcp.seq == 21721 >> 27 0.000535 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#9] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 28 0.000539 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 24617 >> tcp.seq == 23169 >> 29 0.000546 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#10] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 30 0.000556 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 26065 >> tcp.seq == 24617 >> 31 0.000562 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#11] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=8830 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 32 0.000565 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 27513 >> tcp.seq == 26065 >> 33 0.000572 10.10.1.20 -> 10.10.1.10 TCP [TCP Window Update] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9011 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 34 0.000579 10.10.1.20 -> 10.10.1.10 TCP [TCP Window Update] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 35 0.000596 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 28961 >> tcp.seq == 27513 >> 36 0.000604 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#1] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 37 0.000621 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 30409 >> tcp.seq == 28961 >> 38 0.000627 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#2] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 39 0.000650 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 31857 >> tcp.seq == 30409 >> 40 0.000657 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#3] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 41 0.000672 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 33305 >> tcp.seq == 31857 >> 42 0.000679 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#4] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 43 0.000799 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 34753 >> tcp.seq == 33305 >> 44 0.000806 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#5] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 45 0.000857 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 36201 >> tcp.seq == 34753 >> 46 0.000866 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#6] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 47 0.000939 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 37649 >> tcp.seq == 36201 >> 48 0.000946 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#7] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 49 0.000955 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 39097 >> tcp.seq == 37649 >> 50 0.000963 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#8] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423652 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 51 0.001256 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 40545 >> tcp.seq == 39097 >> 52 0.001268 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#9] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423653 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 53 0.001300 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 41993 >> tcp.seq == 40545 >> 54 0.001309 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#10] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423653 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 55 0.001352 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 43441 >> tcp.seq == 41993 >> 56 0.001359 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#11] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423653 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 57 0.001431 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 44889 >> tcp.seq == 43441 >> 58 0.001439 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#12] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423653 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 59 0.001468 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 46337 >> tcp.seq == 44889 >> 60 0.001475 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#13] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423653 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 61 0.001492 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 47785 >> tcp.seq == 46337 >> 62 0.001498 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#14] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423653 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 63 0.001569 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 49233 >> tcp.seq == 47785 >> 64 0.001576 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#15] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423653 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 65 0.001879 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 50681 >> tcp.seq == 49233 >> 66 0.001890 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#16] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423653 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 67 0.001925 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 52129 >> tcp.seq == 50681 >> 68 0.001933 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#17] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423653 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 69 0.002006 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 53577 >> tcp.seq == 52129 >> 70 0.002016 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#18] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423653 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 71 0.002218 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 55025 >> tcp.seq == 53577 >> 72 0.002225 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#19] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423654 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 73 0.002281 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 56473 >> tcp.seq == 55025 >> 74 0.002288 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#20] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423654 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 75 0.002343 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 57921 >> tcp.seq == 56473 >> 76 0.002350 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#21] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423654 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 77 0.002525 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 59369 >> tcp.seq == 57921 >> 78 0.002535 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#22] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423654 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 79 0.002580 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 60817 >> tcp.seq == 59369 >> 80 0.002589 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#23] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423654 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 81 0.002772 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 62265 >> tcp.seq == 60817 >> 82 0.002779 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#24] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423654 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 83 0.002826 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 63713 >> tcp.seq == 62265 >> 84 0.002834 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#25] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423654 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 85 0.002889 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 65161 >> tcp.seq == 63713 >> 86 0.002896 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#26] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423654 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 87 0.002967 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 66609 >> tcp.seq == 65161 >> 88 0.002974 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#27] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423654 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 89 0.003411 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 68057 >> tcp.seq == 66609 >> 90 0.003419 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#28] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423655 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 91 0.003457 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 69505 >> tcp.seq == 68057 >> 92 0.003464 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#29] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423655 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 93 0.003557 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 70953 >> tcp.seq == 69505 >> 94 0.003564 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#30] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423655 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 95 0.003644 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 72401 >> tcp.seq == 70953 >> 96 0.003653 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#31] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423655 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 97 0.003675 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 73849 >> tcp.seq == 72401 >> 98 0.003683 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#32] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423655 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 99 0.003728 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 75297 >> tcp.seq == 73849 >> 100 0.003735 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#33] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423655 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 101 0.003780 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 76745 >> tcp.seq == 75297 >> 102 0.003792 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#34] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423655 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 103 0.003829 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 78193 >> tcp.seq == 76745 >> 104 0.003842 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#35] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423655 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 105 0.003874 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 79641 >> tcp.seq == 78193 >> 106 0.003883 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#36] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423655 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 107 0.004165 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 81089 >> tcp.seq == 79641 >> 108 0.004172 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#37] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423656 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 109 0.004279 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 82537 >> tcp.seq == 81089 >> 110 0.004287 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#38] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423656 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 111 0.004340 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 83985 >> tcp.seq == 82537 >> 112 0.004347 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#39] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423656 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 113 0.004400 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 85433 >> tcp.seq == 83985 >> 114 0.004408 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#40] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423656 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 115 0.004887 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 86881 >> tcp.seq == 85433 >> 116 0.004894 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#41] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423656 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 117 0.004940 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 88329 >> tcp.seq == 86881 >> 118 0.004947 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#42] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423656 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 119 0.005006 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 89777 >> tcp.seq == 88329 >> 120 0.005015 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#43] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423656 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 121 0.005140 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 91225 >> tcp.seq == 89777 >> 122 0.005150 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#44] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 123 0.005194 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 92673 >> tcp.seq == 91225 >> 124 0.005203 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#45] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 125 0.005263 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 94121 >> tcp.seq == 92673 >> 126 0.005270 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#46] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 127 0.005413 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 95569 >> tcp.seq == 94121 >> 128 0.005420 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#47] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 129 0.005480 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 97017 >> tcp.seq == 95569 >> 130 0.005487 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#48] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 131 0.005504 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 98465 >> tcp.seq == 97017 >> 132 0.005511 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#49] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 133 0.005528 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 99913 >> tcp.seq == 98465 >> 134 0.005536 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#50] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 135 0.005553 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 101361 >> tcp.seq == 99913 >> 136 0.005561 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#51] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 137 0.005576 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 102809 >> tcp.seq == 101361 >> 138 0.005583 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#52] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 139 0.005627 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 104257 >> tcp.seq == 102809 >> 140 0.005634 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#53] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 141 0.005689 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 105705 >> tcp.seq == 104257 >> 142 0.005696 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#54] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 143 0.005704 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 107153 >> tcp.seq == 105705 >> 144 0.005710 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#55] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 145 0.005716 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 108601 >> tcp.seq == 107153 >> 146 0.005724 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#56] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 147 0.005727 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 110049 >> tcp.seq == 108601 >> 148 0.005734 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#57] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 149 0.005739 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 111497 >> tcp.seq == 110049 >> 150 0.005746 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#58] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 151 0.005756 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 112945 >> tcp.seq == 111497 >> 152 0.005765 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#59] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 153 0.005768 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 114393 >> tcp.seq == 112945 >> 154 0.005777 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#60] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 155 0.005781 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 115841 >> tcp.seq == 114393 >> 156 0.005789 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#61] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423657 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 157 0.006154 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 117289 >> tcp.seq == 115841 >> 158 0.006162 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#62] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 159 0.006200 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 118737 >> tcp.seq == 117289 >> 160 0.006207 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#63] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 161 0.006229 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 120185 >> tcp.seq == 118737 >> 162 0.006237 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#64] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 163 0.006253 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 121633 >> tcp.seq == 120185 >> 164 0.006259 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#65] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 165 0.006278 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 123081 >> tcp.seq == 121633 >> 166 0.006285 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#66] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 167 0.006294 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 124529 >> tcp.seq == 123081 >> 168 0.006300 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#67] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 169 0.006304 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 125977 >> tcp.seq == 124529 >> 170 0.006310 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#68] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 171 0.006315 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 127425 >> tcp.seq == 125977 >> 172 0.006323 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#69] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 173 0.006333 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 128873 >> tcp.seq == 127425 >> 174 0.006340 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#70] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 175 0.006342 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 130321 >> tcp.seq == 128873 >> 176 0.006349 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#71] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 177 0.006358 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 131769 >> tcp.seq == 130321 >> 178 0.006365 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#72] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 179 0.006368 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 133217 >> tcp.seq == 131769 >> 180 0.006375 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#73] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 181 0.006388 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 134665 >> tcp.seq == 133217 >> 182 0.006395 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#74] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 183 0.006435 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 136113 >> tcp.seq == 134665 >> 184 0.006446 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#75] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 185 0.006506 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 137561 >> tcp.seq == 136113 >> 186 0.006516 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#76] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 187 0.006558 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 139009 >> tcp.seq == 137561 >> 188 0.006565 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#77] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 189 0.006568 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 140457 >> tcp.seq == 139009 >> 190 0.006574 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#78] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 191 0.006579 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 141905 >> tcp.seq == 140457 >> 192 0.006585 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#79] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 193 0.006596 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 143353 >> tcp.seq == 141905 >> 194 0.006603 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#80] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 195 0.006606 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 144801 >> tcp.seq == 143353 >> 196 0.006612 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#81] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 197 0.006654 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 146249 >> tcp.seq == 144801 >> 198 0.006661 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#82] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 >> 199 0.006696 10.10.1.10 -> 10.10.1.20 SSH [TCP Fast Retransmission] Encrypted request packet >> len=1448 tcp.nxtseq == 8689 >> tcp.seq == 7241 >> 200 0.006703 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#83] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423658 >> TSER=261560666 SLE=8689 SRE=23169 tcp.seq == 49 >> 201 0.246652 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 202 0.246664 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#84] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902423897 >> TSER=261560896 SLE=8689 SRE=23169 tcp.seq == 49 >> 203 0.518331 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 204 0.518343 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#85] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902424168 >> TSER=261561156 SLE=8689 SRE=23169 tcp.seq == 49 >> 205 0.852522 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 206 0.852535 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#86] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902424501 >> TSER=261561476 SLE=8689 SRE=23169 tcp.seq == 49 >> 207 1.311920 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 208 1.311933 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#87] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902424958 >> TSER=261561916 SLE=8689 SRE=23169 tcp.seq == 49 >> 209 2.022170 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 210 2.022184 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#88] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902425666 >> TSER=261562596 SLE=8689 SRE=23169 tcp.seq == 49 >> 211 3.233004 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 212 3.233016 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#89] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902426872 >> TSER=261563756 SLE=8689 SRE=23169 tcp.seq == 49 >> 213 5.444340 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 214 5.444353 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#90] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902429074 >> TSER=261565876 SLE=8689 SRE=23169 tcp.seq == 49 >> 215 9.658815 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 216 9.658826 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#91] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902433272 >> TSER=261569916 SLE=8689 SRE=23169 tcp.seq == 49 >> 217 17.882735 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 218 17.882748 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#92] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902441463 >> TSER=261577796 SLE=8689 SRE=23169 tcp.seq == 49 >> 219 34.113339 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 220 34.113352 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#93] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902457629 >> TSER=261593356 SLE=8689 SRE=23169 tcp.seq == 49 >> 221 50.343593 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 222 50.343607 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#94] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902473795 >> TSER=261608916 SLE=8689 SRE=23169 tcp.seq == 49 >> 223 66.567449 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 >> tcp.nxtseq == 8689 tcp.seq == >> 7241 >> 224 66.567461 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#95] ssh > 28296 [ACK] Seq=49 Ack=7241 >> Win=9283 Len=0 TSV=1902489954 >> TSER=261624476 SLE=8689 SRE=23169 tcp.seq == 49 >> 225 82.793601 10.10.1.10 -> 10.10.1.20 TCP 28296 > ssh [RST, ACK] Seq=146249 Ack=49 Win=4163 Len=0 >> TSV=261640036 TSER=1902489954 >> tcp.seq == 146249 >> >> Just to confirm both machines involved are running 8.2-RELEASE >> with both hardware checksums and offloading disabled using >> -tso -rxcsum -txcsum. >> >> The sender is using em and the receiver using igb. > > > Regards > Steve > > ================================================ > This e.mail is private and confidential between Multiplay (UK) Ltd. and the person or entity to whom > it is addressed. In the event of misdirection, the recipient is prohibited from using, copying, > printing or otherwise disseminating it or any information contained in it. > In the event of misdirection, illegible or incomplete transmission please telephone +44 845 868 1337 > or return the E.mail to postmaster@multiplay.co.uk. > > _______________________________________________ > freebsd-net@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-net > To unsubscribe, send any mail to "freebsd-net-unsubscribe@freebsd.org" > >