VirtualBox

Ticket #6284: tcpdump-shortlogin.txt

File tcpdump-shortlogin.txt, 5.9 KB (added by Giovanni Toraldo (gionn), 15 years ago)

Tcpdump of the ssh session that *doesn't* works (username <= 8)

Line 
120:26:32.351839 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [S], seq 1275571395, win 65535, options [mss 1460,nop,wscale 1,nop,nop,TS val 488014646 ecr 0,sackOK,eol], length 0
220:26:32.417215 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [S.], seq 264034311, ack 1275571396, win 5792, options [mss 1336,sackOK,TS val 112767201 ecr 488014646,nop,wscale 5], length 0
320:26:32.417278 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [.], ack 1, win 33100, options [nop,nop,TS val 488014646 ecr 112767201], length 0
420:26:32.502135 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [P.], seq 1:33, ack 1, win 181, options [nop,nop,TS val 112767219 ecr 488014646], length 32
520:26:32.502179 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [.], ack 33, win 33084, options [nop,nop,TS val 488014647 ecr 112767219], length 0
620:26:32.502451 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1:22, ack 33, win 33100, options [nop,nop,TS val 488014647 ecr 112767219], length 21
720:26:32.577787 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [.], ack 22, win 181, options [nop,nop,TS val 112767239 ecr 488014647], length 0
820:26:32.577834 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 22:814, ack 33, win 33100, options [nop,nop,TS val 488014648 ecr 112767239], length 792
920:26:32.581843 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [P.], seq 33:817, ack 22, win 181, options [nop,nop,TS val 112767239 ecr 488014647], length 784
1020:26:32.581910 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [.], ack 817, win 32708, options [nop,nop,TS val 488014648 ecr 112767239], length 0
1120:26:32.711156 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [.], ack 814, win 231, options [nop,nop,TS val 112767275 ecr 488014648], length 0
1220:26:32.711193 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 814:838, ack 817, win 33100, options [nop,nop,TS val 488014649 ecr 112767275], length 24
1320:26:32.783043 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [.], ack 838, win 231, options [nop,nop,TS val 112767291 ecr 488014649], length 0
1420:26:32.784824 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [P.], seq 817:969, ack 838, win 231, options [nop,nop,TS val 112767291 ecr 488014649], length 152
1520:26:32.784889 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [.], ack 969, win 33024, options [nop,nop,TS val 488014650 ecr 112767291], length 0
1620:26:32.786398 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 838:982, ack 969, win 33100, options [nop,nop,TS val 488014650 ecr 112767291], length 144
1720:26:32.890430 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [P.], seq 969:1689, ack 982, win 280, options [nop,nop,TS val 112767316 ecr 488014650], length 720
1820:26:32.890520 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [.], ack 1689, win 32740, options [nop,nop,TS val 488014651 ecr 112767316], length 0
1920:26:32.892719 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 982:998, ack 1689, win 33100, options [nop,nop,TS val 488014651 ecr 112767316], length 16
2020:26:33.007153 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [.], ack 998, win 280, options [nop,nop,TS val 112767347 ecr 488014651], length 0
2120:26:33.007220 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 998:1046, ack 1689, win 33100, options [nop,nop,TS val 488014652 ecr 112767347], length 48
2220:26:33.087513 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [.], ack 1046, win 280, options [nop,nop,TS val 112767365 ecr 488014652], length 0
2320:26:33.088034 IP 192.168.1.1.ssh > 192.168.14.8.59485: Flags [P.], seq 1689:1737, ack 1046, win 280, options [nop,nop,TS val 112767365 ecr 488014652], length 48
2420:26:33.088090 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [.], ack 1737, win 33076, options [nop,nop,TS val 488014653 ecr 112767365], length 0
2520:26:33.088296 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014653 ecr 112767365], length 64
2620:26:33.331292 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014655 ecr 112767365], length 64
2720:26:33.531484 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014657 ecr 112767365], length 64
2820:26:33.931809 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014661 ecr 112767365], length 64
2920:26:34.732665 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014669 ecr 112767365], length 64
3020:26:36.334601 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014685 ecr 112767365], length 64
3120:26:39.537660 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014717 ecr 112767365], length 64
3220:26:45.943244 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014781 ecr 112767365], length 64
3320:26:52.349318 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014845 ecr 112767365], length 64
3420:26:58.755926 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014909 ecr 112767365], length 64
3520:27:05.162541 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488014973 ecr 112767365], length 64
3620:27:11.568638 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488015037 ecr 112767365], length 64
3720:27:17.974314 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [P.], seq 1046:1110, ack 1737, win 33100, options [nop,nop,TS val 488015101 ecr 112767365], length 64
3820:27:24.381380 IP 192.168.14.8.59485 > 192.168.1.1.ssh: Flags [R.], seq 1110, ack 1737, win 33100, length 0

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy