From owner-freebsd-net@FreeBSD.ORG Tue Aug 2 01:51:45 2011 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id A039C1065686; Tue, 2 Aug 2011 01:51:45 +0000 (UTC) (envelope-from prvs=119502d6cc=killing@multiplay.co.uk) Received: from mail1.multiplay.co.uk (mail1.multiplay.co.uk [85.236.96.23]) by mx1.freebsd.org (Postfix) with ESMTP id 191008FC0A; Tue, 2 Aug 2011 01:51:43 +0000 (UTC) X-MDAV-Processed: mail1.multiplay.co.uk, Tue, 02 Aug 2011 02:40:20 +0100 X-Spam-Processed: mail1.multiplay.co.uk, Tue, 02 Aug 2011 02:40:20 +0100 X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on mail1.multiplay.co.uk X-Spam-Level: X-Spam-Status: No, score=-5.0 required=6.0 tests=USER_IN_WHITELIST shortcircuit=ham autolearn=disabled version=3.2.5 Received: from r2d2 ([188.220.16.49]) by mail1.multiplay.co.uk (mail1.multiplay.co.uk [85.236.96.23]) (MDaemon PRO v10.0.4) with ESMTP id md50014427038.msg; Tue, 02 Aug 2011 02:40:20 +0100 X-MDRemoteIP: 188.220.16.49 X-Return-Path: prvs=119502d6cc=killing@multiplay.co.uk X-Envelope-From: killing@multiplay.co.uk Message-ID: <1F95A4C2D54E4F369830143CBDB5FF86@multiplay.co.uk> From: "Steven Hartland" To: , References: Date: Tue, 2 Aug 2011 02:40:51 +0100 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="iso-8859-1"; reply-type=response Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.5931 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.6109 Cc: Subject: Re: tcp failing to recover from a packet loss under 8.2-RELEASE? X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 02 Aug 2011 01:51:45 -0000 ----- Original Message ----- > What I believe we're seeing from the tcpdump trace is the > packet loss on the network results in an unrecoverable tcp > session. > > From my very limited knowledge of tcp, I would expect to see > the session to recover after receiving the lost packet by > either a fast retransmit or standard retransmit. > > My interpretation of the capture is the packet is indeed resent > by the sender but that the receiver continues to respond > with TCP Dup ACK for said missing packet instead of recovering. > > Trace is below, which starts from just before the point > the receiver sees the dropped packet to the point where the sender > gives up and resets the session. > > Is my analysis correct and does it look like this is a tcp > stack bug? Something I've just noticed that might be of note for this is that the receiving machine seeing the stall seems to be increasing its "discarded due to memory problems" count at a decent rate:- 127187 discarded due to memory problems the 1 second later during a stall 127192 discarded due to memory problems I believe this is tcps_rcvmemdrop in tcp_reass.c to which there's the following comment:- * XXXLAS: Using sbspace(so->so_rcv) instead of so->so_rcv.sb_hiwat * should work but causes packets to be dropped when they shouldn't. I notice this code is relatively new, so I'm wondering if this may be something to do with what we're seeing, possibly still dropping packets it shouldn't? @Lawrence apologies' for the direct mail, but I believe you where the original author this particular change so wondered if you may be able to shed any light on this? > > tshark -z "proto,colinfo,tcp.seq,tcp.seq" -z "proto,colinfo,tcp.nxtseq,tcp.nxtseq" -r tcp-stall.pcap > 1 0.000000 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 1449 tcp.seq == 1 > 2 0.000028 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 2897 tcp.seq == 1449 > 3 0.000034 10.10.1.20 -> 10.10.1.10 TCP ssh > 28296 [ACK] Seq=49 Ack=2897 Win=9102 Len=0 TSV=1902423651 TSER=261560659 > tcp.seq == 49 > 4 0.000051 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 4345 tcp.seq == 2897 > 5 0.000078 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 5793 tcp.seq == 4345 > 6 0.000084 10.10.1.20 -> 10.10.1.10 TCP ssh > 28296 [ACK] Seq=49 Ack=5793 Win=8921 Len=0 TSV=1902423651 TSER=261560659 > tcp.seq == 49 > 7 0.000100 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 7241 tcp.seq == 5793 > 8 0.000135 10.10.1.10 -> 10.10.1.20 SSH [TCP Previous segment lost] Encrypted request packet len=1448 tcp.nxtseq == 10137 > tcp.seq == 8689 > 9 0.000147 10.10.1.20 -> 10.10.1.10 TCP ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 TSER=261560660 > SLE=8689 SRE=10137 tcp.seq == 49 > 10 0.000167 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 11585 tcp.seq == 10137 > 11 0.000173 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#1] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=11585 tcp.seq == 49 > 12 0.000180 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 13033 tcp.seq == 11585 > 13 0.000186 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#2] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=13033 tcp.seq == 49 > 14 0.000191 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 14481 tcp.seq == 13033 > 15 0.000197 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#3] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=14481 tcp.seq == 49 > 16 0.000201 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 15929 tcp.seq == 14481 > 17 0.000209 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#4] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=15929 tcp.seq == 49 > 18 0.000229 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 17377 tcp.seq == 15929 > 19 0.000237 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#5] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=17377 tcp.seq == 49 > 20 0.000460 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 18825 tcp.seq == 17377 > 21 0.000469 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#6] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=18825 tcp.seq == 49 > 22 0.000505 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 20273 tcp.seq == 18825 > 23 0.000511 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#7] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=20273 tcp.seq == 49 > 24 0.000513 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 21721 tcp.seq == 20273 > 25 0.000519 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#8] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=21721 tcp.seq == 49 > 26 0.000528 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 23169 tcp.seq == 21721 > 27 0.000535 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#9] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 28 0.000539 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 24617 tcp.seq == 23169 > 29 0.000546 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#10] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 30 0.000556 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 26065 tcp.seq == 24617 > 31 0.000562 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 9#11] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=8830 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 32 0.000565 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 27513 tcp.seq == 26065 > 33 0.000572 10.10.1.20 -> 10.10.1.10 TCP [TCP Window Update] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9011 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 34 0.000579 10.10.1.20 -> 10.10.1.10 TCP [TCP Window Update] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 35 0.000596 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 28961 tcp.seq == 27513 > 36 0.000604 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#1] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 37 0.000621 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 30409 tcp.seq == 28961 > 38 0.000627 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#2] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 39 0.000650 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 31857 tcp.seq == 30409 > 40 0.000657 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#3] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 41 0.000672 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 33305 tcp.seq == 31857 > 42 0.000679 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#4] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 43 0.000799 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 34753 tcp.seq == 33305 > 44 0.000806 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#5] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 45 0.000857 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 36201 tcp.seq == 34753 > 46 0.000866 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#6] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 47 0.000939 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 37649 tcp.seq == 36201 > 48 0.000946 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#7] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 49 0.000955 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 39097 tcp.seq == 37649 > 50 0.000963 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#8] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423652 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 51 0.001256 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 40545 tcp.seq == 39097 > 52 0.001268 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#9] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423653 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 53 0.001300 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 41993 tcp.seq == 40545 > 54 0.001309 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#10] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423653 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 55 0.001352 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 43441 tcp.seq == 41993 > 56 0.001359 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#11] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423653 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 57 0.001431 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 44889 tcp.seq == 43441 > 58 0.001439 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#12] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423653 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 59 0.001468 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 46337 tcp.seq == 44889 > 60 0.001475 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#13] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423653 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 61 0.001492 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 47785 tcp.seq == 46337 > 62 0.001498 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#14] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423653 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 63 0.001569 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 49233 tcp.seq == 47785 > 64 0.001576 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#15] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423653 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 65 0.001879 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 50681 tcp.seq == 49233 > 66 0.001890 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#16] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423653 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 67 0.001925 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 52129 tcp.seq == 50681 > 68 0.001933 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#17] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423653 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 69 0.002006 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 53577 tcp.seq == 52129 > 70 0.002016 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#18] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423653 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 71 0.002218 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 55025 tcp.seq == 53577 > 72 0.002225 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#19] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423654 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 73 0.002281 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 56473 tcp.seq == 55025 > 74 0.002288 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#20] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423654 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 75 0.002343 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 57921 tcp.seq == 56473 > 76 0.002350 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#21] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423654 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 77 0.002525 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 59369 tcp.seq == 57921 > 78 0.002535 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#22] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423654 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 79 0.002580 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 60817 tcp.seq == 59369 > 80 0.002589 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#23] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423654 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 81 0.002772 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 62265 tcp.seq == 60817 > 82 0.002779 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#24] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423654 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 83 0.002826 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 63713 tcp.seq == 62265 > 84 0.002834 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#25] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423654 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 85 0.002889 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 65161 tcp.seq == 63713 > 86 0.002896 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#26] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423654 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 87 0.002967 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 66609 tcp.seq == 65161 > 88 0.002974 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#27] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423654 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 89 0.003411 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 68057 tcp.seq == 66609 > 90 0.003419 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#28] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423655 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 91 0.003457 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 69505 tcp.seq == 68057 > 92 0.003464 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#29] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423655 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 93 0.003557 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 70953 tcp.seq == 69505 > 94 0.003564 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#30] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423655 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 95 0.003644 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 72401 tcp.seq == 70953 > 96 0.003653 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#31] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423655 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 97 0.003675 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 73849 tcp.seq == 72401 > 98 0.003683 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#32] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423655 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 99 0.003728 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 75297 tcp.seq == 73849 > 100 0.003735 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#33] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423655 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 101 0.003780 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 76745 tcp.seq == 75297 > 102 0.003792 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#34] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423655 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 103 0.003829 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 78193 tcp.seq == 76745 > 104 0.003842 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#35] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423655 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 105 0.003874 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 79641 tcp.seq == 78193 > 106 0.003883 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#36] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423655 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 107 0.004165 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 81089 tcp.seq == 79641 > 108 0.004172 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#37] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423656 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 109 0.004279 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 82537 tcp.seq == 81089 > 110 0.004287 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#38] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423656 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 111 0.004340 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 83985 tcp.seq == 82537 > 112 0.004347 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#39] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423656 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 113 0.004400 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 85433 tcp.seq == 83985 > 114 0.004408 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#40] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423656 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 115 0.004887 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 86881 tcp.seq == 85433 > 116 0.004894 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#41] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423656 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 117 0.004940 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 88329 tcp.seq == 86881 > 118 0.004947 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#42] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423656 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 119 0.005006 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 89777 tcp.seq == 88329 > 120 0.005015 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#43] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423656 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 121 0.005140 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 91225 tcp.seq == 89777 > 122 0.005150 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#44] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 123 0.005194 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 92673 tcp.seq == 91225 > 124 0.005203 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#45] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 125 0.005263 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 94121 tcp.seq == 92673 > 126 0.005270 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#46] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 127 0.005413 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 95569 tcp.seq == 94121 > 128 0.005420 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#47] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 129 0.005480 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 97017 tcp.seq == 95569 > 130 0.005487 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#48] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 131 0.005504 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 98465 tcp.seq == 97017 > 132 0.005511 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#49] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 133 0.005528 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 99913 tcp.seq == 98465 > 134 0.005536 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#50] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 135 0.005553 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 101361 tcp.seq == 99913 > 136 0.005561 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#51] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 137 0.005576 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 102809 tcp.seq == 101361 > 138 0.005583 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#52] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 139 0.005627 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 104257 tcp.seq == 102809 > 140 0.005634 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#53] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 141 0.005689 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 105705 tcp.seq == 104257 > 142 0.005696 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#54] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 143 0.005704 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 107153 tcp.seq == 105705 > 144 0.005710 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#55] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 145 0.005716 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 108601 tcp.seq == 107153 > 146 0.005724 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#56] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 147 0.005727 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 110049 tcp.seq == 108601 > 148 0.005734 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#57] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 149 0.005739 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 111497 tcp.seq == 110049 > 150 0.005746 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#58] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 151 0.005756 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 112945 tcp.seq == 111497 > 152 0.005765 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#59] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 153 0.005768 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 114393 tcp.seq == 112945 > 154 0.005777 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#60] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 155 0.005781 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 115841 tcp.seq == 114393 > 156 0.005789 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#61] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423657 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 157 0.006154 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 117289 tcp.seq == 115841 > 158 0.006162 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#62] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 159 0.006200 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 118737 tcp.seq == 117289 > 160 0.006207 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#63] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 161 0.006229 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 120185 tcp.seq == 118737 > 162 0.006237 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#64] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 163 0.006253 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 121633 tcp.seq == 120185 > 164 0.006259 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#65] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 165 0.006278 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 123081 tcp.seq == 121633 > 166 0.006285 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#66] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 167 0.006294 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 124529 tcp.seq == 123081 > 168 0.006300 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#67] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 169 0.006304 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 125977 tcp.seq == 124529 > 170 0.006310 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#68] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 171 0.006315 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 127425 tcp.seq == 125977 > 172 0.006323 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#69] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 173 0.006333 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 128873 tcp.seq == 127425 > 174 0.006340 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#70] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 175 0.006342 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 130321 tcp.seq == 128873 > 176 0.006349 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#71] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 177 0.006358 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 131769 tcp.seq == 130321 > 178 0.006365 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#72] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 179 0.006368 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 133217 tcp.seq == 131769 > 180 0.006375 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#73] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 181 0.006388 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 134665 tcp.seq == 133217 > 182 0.006395 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#74] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 183 0.006435 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 136113 tcp.seq == 134665 > 184 0.006446 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#75] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 185 0.006506 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 137561 tcp.seq == 136113 > 186 0.006516 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#76] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 187 0.006558 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 139009 tcp.seq == 137561 > 188 0.006565 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#77] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 189 0.006568 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 140457 tcp.seq == 139009 > 190 0.006574 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#78] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 191 0.006579 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 141905 tcp.seq == 140457 > 192 0.006585 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#79] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 193 0.006596 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 143353 tcp.seq == 141905 > 194 0.006603 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#80] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 195 0.006606 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 144801 tcp.seq == 143353 > 196 0.006612 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#81] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 197 0.006654 10.10.1.10 -> 10.10.1.20 SSH Encrypted request packet len=1448 tcp.nxtseq == 146249 tcp.seq == 144801 > 198 0.006661 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#82] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560660 SLE=8689 SRE=23169 tcp.seq == 49 > 199 0.006696 10.10.1.10 -> 10.10.1.20 SSH [TCP Fast Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 > tcp.seq == 7241 > 200 0.006703 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#83] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423658 > TSER=261560666 SLE=8689 SRE=23169 tcp.seq == 49 > 201 0.246652 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 202 0.246664 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#84] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902423897 > TSER=261560896 SLE=8689 SRE=23169 tcp.seq == 49 > 203 0.518331 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 204 0.518343 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#85] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902424168 > TSER=261561156 SLE=8689 SRE=23169 tcp.seq == 49 > 205 0.852522 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 206 0.852535 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#86] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902424501 > TSER=261561476 SLE=8689 SRE=23169 tcp.seq == 49 > 207 1.311920 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 208 1.311933 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#87] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902424958 > TSER=261561916 SLE=8689 SRE=23169 tcp.seq == 49 > 209 2.022170 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 210 2.022184 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#88] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902425666 > TSER=261562596 SLE=8689 SRE=23169 tcp.seq == 49 > 211 3.233004 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 212 3.233016 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#89] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902426872 > TSER=261563756 SLE=8689 SRE=23169 tcp.seq == 49 > 213 5.444340 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 214 5.444353 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#90] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902429074 > TSER=261565876 SLE=8689 SRE=23169 tcp.seq == 49 > 215 9.658815 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 216 9.658826 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#91] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902433272 > TSER=261569916 SLE=8689 SRE=23169 tcp.seq == 49 > 217 17.882735 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 218 17.882748 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#92] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902441463 > TSER=261577796 SLE=8689 SRE=23169 tcp.seq == 49 > 219 34.113339 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 220 34.113352 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#93] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902457629 > TSER=261593356 SLE=8689 SRE=23169 tcp.seq == 49 > 221 50.343593 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 222 50.343607 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#94] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902473795 > TSER=261608916 SLE=8689 SRE=23169 tcp.seq == 49 > 223 66.567449 10.10.1.10 -> 10.10.1.20 SSH [TCP Retransmission] Encrypted request packet len=1448 tcp.nxtseq == 8689 tcp.seq > == > 7241 > 224 66.567461 10.10.1.20 -> 10.10.1.10 TCP [TCP Dup ACK 34#95] ssh > 28296 [ACK] Seq=49 Ack=7241 Win=9283 Len=0 TSV=1902489954 > TSER=261624476 SLE=8689 SRE=23169 tcp.seq == 49 > 225 82.793601 10.10.1.10 -> 10.10.1.20 TCP 28296 > ssh [RST, ACK] Seq=146249 Ack=49 Win=4163 Len=0 TSV=261640036 > TSER=1902489954 > tcp.seq == 146249 > > Just to confirm both machines involved are running 8.2-RELEASE > with both hardware checksums and offloading disabled using > -tso -rxcsum -txcsum. > > The sender is using em and the receiver using igb. Regards Steve ================================================ This e.mail is private and confidential between Multiplay (UK) Ltd. and the person or entity to whom it is addressed. In the event of misdirection, the recipient is prohibited from using, copying, printing or otherwise disseminating it or any information contained in it. In the event of misdirection, illegible or incomplete transmission please telephone +44 845 868 1337 or return the E.mail to postmaster@multiplay.co.uk.