lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 15 May 2014 11:52:55 +0800
From:	Chptx Young <chptxy@...il.com>
To:	Linux Netdev List <netdev@...r.kernel.org>
Subject: why tcp retrancimission continue after FIN flag received?

hello,
      these packtes were captured with tcpdump on Android/linux
3.4.39/10.180.43.211, linux
tries retransimissin (packet #35 ) after FIN (#32), any problem here?

     No.     Time        Source                Destination
Protocol Length  Info
     26 17.657176   10.180.43.211         10.0.0.172            TCP
  1466   [TCP segment of a reassembled PDU]
     27 37.630979   10.180.43.211         10.0.0.172            TCP
  1466   [TCP Retransmission] [TCP segment of a reassembled PDU]
     28 40.876444   10.0.0.172            10.180.43.211         TCP
  56     http > 32921 [ACK] Seq=1 Ack=8687 Win=22560 Len=0
     29 40.877060   10.180.43.211         10.0.0.172            TCP
  1466   [TCP segment of a reassembled PDU]
     30 40.877248   10.180.43.211         10.0.0.172            TCP
  1466   [TCP segment of a reassembled PDU]
     31 80.830941   10.180.43.211         10.0.0.172            TCP
  1466   [TCP Retransmission] [TCP segment of a reassembled PDU]
     32 82.723420   10.0.0.172            10.180.43.211         TCP
  56     http > 32921 [FIN, ACK] Seq=1 Ack=8687 Win=22560 Len=0
     33 82.725760   10.180.43.211         10.0.0.172            TCP
  56     32921 > http [ACK] Seq=15737 Ack=2 Win=14600 Len=0
     34 83.536384   10.0.0.172            10.180.43.211         TCP
  56     http > 32921 [RST] Seq=1 Win=0 Len=0
     35 160.831079  10.180.43.211         10.0.0.172            TCP
  1466   [TCP Retransmission] [TCP segment of a reassembled PDU]
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ