none
AD LDS: LDAPS keine SSL-Verbindung RRS feed

  • Allgemeine Diskussion

  • Hi,

    ich habe das Problem, das keine LDAPS Verbindung zu einer AD LDS Instanzen aufgebaut werden kann. Besser gesagt, es kann keine externe SSL Verbindung initiiert werden.

    Die Zertifikate sind richtig hinterlegt, selbsigniert von einer nicht Microsoft CA und auch mit den certutils überprüft. Eine lokale Verbindung via ldp.exe mit SSL auf den SSL Port der ADAM Instanz funktioniert, auch auf das "normale" AD (Server ist zugleich Domain Controller) funktioniert die Verbindung und ich erhalte die Anmeldung im Fenster. Jedoch, wie gesagt, von extern via openssl nicht. Auch keine LDAPS Search. Mir wird das Zertifikat vom Server nicht ausgegeben. Zudem erscheint bei jedem Verbindungsaufbau unten stehende Fehlermeldung im Log des Servers.

    Fehlermeldung im Log vom Windows 2008 R2 Server:

    Eine TLS 1.0-Verbindungsanforderung wurde von einer Remoteclientanwendung übermittelt, jedoch werden keine der Verschlüsselungssammlungen, die von der Clientanwendung unterstützt werden, vom Server unterstützt. Fehler bei der SSL-Verbindungsanforderung.

    Ereigniss-ID: 36874

    Wie kann ich TLS 1.0 für den Server "aktivieren"? Wer kann mir helfen?

    Dienstag, 29. Januar 2013 19:31

Alle Antworten

  • Am 29.01.2013 20:31, schrieb Mitarbeiter-007:
    > Jedoch, wie gesagt, von extern via openssl nicht. Auch keine LDAPS Search.
     
    Was hat openssl mit LDAPS zu tun? mfg Martin
     

    NO THEY ARE NOT EVIL, if you know what you are doing: Good or bad GPOs?
    Wenn meine Antwort hilfreich war, freue ich mich über eine Bewertung! If my answer was helpful, I'm glad about a rating!
    Dienstag, 29. Januar 2013 19:43

  • Am 29.01.2013 20:31, schrieb Mitarbeiter-007:

    Jedoch, wie gesagt, von extern via openssl nicht

    Gehts denn intern via ldp.exe -> Verbinden "SSL"

    Tschö
    mark


    Mark Heitbrink - MVP Windows Server - Group Policy

    Homepage:       www.gruppenrichtlinien.de - deutsch
    GPO Tool:       www.reg2xml.com - Registry Export File Converter
    NetworkTrayTool www.gruppenrichtlinien.de/tools/Networktraytool.htm

    Dienstag, 29. Januar 2013 20:08
  • @ Martin: Naja, was ist denn LDAPS --> LDAP over SSL und wenn ich beim connect mit openssl auf den LDAPS Port schon nicht das öffentliche Zertifikat sehe bzw. schon der Handshake beim Server-Hello scheitert, scheint irgendetwas an der SSL Konfiguration nicht zu stimmen. Und das egal, mit welcher SSL Version / TLS Version.

    @Mark: Das ist ja das dubiose. Verbinden via ldp.exe mit "Häckchen" SSL auf den LDAPS Port funktioniert. Es scheitert jedoch eine extern aufgebaute LDAPS Verbindung. Auf dem Domaincontroller ist im Eventlog zu sehen, das openssl versucht eine TLS 1.0 Verbindung aufzubauen die wiederum mit der Fehlermeldung

    "Eine TLS 1.0-Verbindungsanforderung wurde von einer Remoteclientanwendung übermittelt, jedoch werden keine der Verschlüsselungssammlungen, die von der Clientanwendung unterstützt werden, vom Server unterstützt. Fehler bei der SSL-Verbindungsanforderung.

    Ereigniss-ID: 36874"

    abgewiesen wird.

    Wir haben noch einen DC, auf dem der externe openssl als auch ldapsearch connect funktioniert, auf dem auf gleicher Weise die Zertifikate hinzugefügt wurden, als auch die Registryeinträge unter [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 1.0\] identisch sind.

    Daher meine Frage, warum werden TLS 1.0 als auch SSLv2/SSLv3 Anfragen abgewiesen, bzw. was ist auf dem DC weitergehend noch zu konfigurieren, habt Ihr eine Idee?

    Mittwoch, 30. Januar 2013 08:54
  • Am 30.01.2013 09:54, schrieb Mitarbeiter-007:
    > Wir haben noch einen DC, auf dem der externe openssl als auch
    > ldapsearch connect funktioniert, auf dem auf gleicher Weise die
    > Zertifikate hinzugefügt wurden//
     
    Gleiches OS?
     

    NO THEY ARE NOT EVIL, if you know what you are doing: Good or bad GPOs?
    Wenn meine Antwort hilfreich war, freue ich mich über eine Bewertung! If my answer was helpful, I'm glad about a rating!
    Mittwoch, 30. Januar 2013 19:56
  • Hallo,

    ich habe ein SSL Zertifikat ausgetauscht und seitdem diese Meldung im Ereignisprotokoll, zusammen mit

    einer anderen.

    "Eine SSL 3.0-Verbindungsanforderung wurde von einer Remoteclientanwendung übermittelt, jedoch werden keine der Verschlüsselungssammlungen, die von der Clientanwendung unterstützt werden, vom Server unterstützt. Fehler bei der SSL-Verbindungsanforderung."

    Bei uns funktioniert die Webseite nicht bei jedem.

    Manche können die Webseite anzeigen andere Clients nicht.

    Habt ihr das Problem gelöst?

    Grüße

    apfelsine

    Donnerstag, 31. Oktober 2013 08:43
  • Schau in folgenden Artikel unter "Cause" und "Workaround" bzgl. den Hintergründen und ob Ihr davon betroffen seit. Der Hotfix spielt erst mal keine Rolle.

    Clients cannot make connections if you require client certificates on a Web site
    http://support.microsoft.com/kb/933430/en-us

    Ansonsten scheint der Server Etypes anzubieten die nicht alle Clients bei euch unterstützen können - s.a.:

    How TLS/SSL Works
    http://technet.microsoft.com/en-us/library/cc783349.aspx#w2k3tr_schan_how_hkrr
    -> Handshake and Cipher Suite Negotiation ff.

    Zu sehen in einem Network-Trace. CAPI2-Monitoring ab Windows 7 ist ggf. auch aufschlussreich.

    S.a.:

    Troubleshooting LDAP Over SSL
    http://blogs.technet.com/b/askds/archive/2008/03/13/troubleshooting-ldap-over-ssl.aspx

    Reading LDAP SSL Network Traffic with NetMon 3.4 and NMDecrypt
    http://blogs.technet.com/b/askds/archive/2010/11/17/reading-ldap-ssl-network-traffic-with-netmon-3-4-and-nmdecrypt.aspx

    Troubleshooting PKI Problems
    http://technet.microsoft.com/en-us/library/cc749296.aspx
    -> Enable CAPI2 Logging

    --

    Tobias Redelberger
    StarNET Services (HomeOffice)
    Frankfurter Allee 193
    D-10365 Berlin
    Tel: +49 (30) 86 87 02 678
    Mobil: +49 (163) 84 74 421

    Donnerstag, 31. Oktober 2013 16:15
  • Ich habe festgestellt, das in der Konsole unter den Stammzertifizierungsstellen noch das alte Zertifikat angezeigt wird, obwohl ich es aus der Liste im IIS entfernt hatte...

    führt das evtl. zu einem Problem? Das alte Zertifikat ist natürlich abgelaufen.

    Ich habe bei einem Client-Browser wo ich die Internet-Seite nicht laden kann den Netzwerk Monitor mitlaufen lassen und der hat beim Client folgendes aufgezeichnet:

    34	15:48:07 06.11.2013	9.7038050	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553388, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:5, IPv4:19}
    35	15:48:08 06.11.2013	9.9543490	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883163, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:6, IPv4:19}
    36	15:48:08 06.11.2013	9.9802953	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56640, PayloadLen=0, Seq=1489030531, Ack=700883164, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:6, IPv4:19}
    37	15:48:08 06.11.2013	9.9804341	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883164, Ack=1489030532, Win=16698 (scale factor 0x2) = 66792	{TCP:6, IPv4:19}
    38	15:48:08 06.11.2013	9.9824441	Unavailable	192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:8, SSLVersionSelector:7, TCP:6, IPv4:19}
    39	15:48:08 06.11.2013	10.0250739	Unavailable	12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate.	{TLS:8, SSLVersionSelector:7, TCP:6, IPv4:19}
    40	15:48:08 06.11.2013	10.0256552	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:[Continuation to #39]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56640, PayloadLen=1348, Seq=1489031984 - 1489033332, Ack=700883329, Win=260 (scale factor 0x8) = 66560	{TCP:6, IPv4:19}
    41	15:48:08 06.11.2013	10.0257373	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883329, Ack=1489033332, Win=16698 (scale factor 0x2) = 66792	{TCP:6, IPv4:19}
    42	15:48:08 06.11.2013	10.0259218	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883329, Ack=1489033332, Win=16698 (scale factor 0x2) = 66792	{TCP:6, IPv4:19}
    46	15:48:08 06.11.2013	10.0516891	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56640, PayloadLen=0, Seq=1489033332, Ack=700883330, Win=0 (scale factor 0x8) = 0	{TCP:6, IPv4:19}
    48	15:48:08 06.11.2013	10.0828547		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56642, DstPort=HTTPS(443), PayloadLen=0, Seq=2615148853, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:12, IPv4:19}
    49	15:48:08 06.11.2013	10.1062853		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56642, PayloadLen=0, Seq=1378787766, Ack=2615148854, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:12, IPv4:19}
    50	15:48:08 06.11.2013	10.1064121		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56642, DstPort=HTTPS(443), PayloadLen=0, Seq=2615148854, Ack=1378787767, Win=16698 (scale factor 0x2) = 66792	{TCP:12, IPv4:19}
    51	15:48:08 06.11.2013	10.1079854		192.168.1.142	12.345.678.912	SSL	SSL: SSLv3 Rec Layer-1 HandShake: Client Hello.	{SSL:14, SSLVersionSelector:13, TCP:12, IPv4:19}
    52	15:48:08 06.11.2013	10.1306427		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56642, PayloadLen=0, Seq=1378787767, Ack=2615148942, Win=0 (scale factor 0x8) = 0	{TCP:12, IPv4:19}
    53	15:48:08 06.11.2013	10.1342208		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082173, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:15, IPv4:19}
    54	15:48:08 06.11.2013	10.1570089		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56644, PayloadLen=0, Seq=3690001701, Ack=607082174, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:15, IPv4:19}
    55	15:48:08 06.11.2013	10.1571378		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082174, Ack=3690001702, Win=16698 (scale factor 0x2) = 66792	{TCP:15, IPv4:19}
    56	15:48:08 06.11.2013	10.1586576		192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:17, SSLVersionSelector:16, TCP:15, IPv4:19}
    57	15:48:08 06.11.2013	10.1863776		12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate.	{TLS:17, SSLVersionSelector:16, TCP:15, IPv4:19}
    58	15:48:08 06.11.2013	10.1872285		12.345.678.912	192.168.1.142	TCP	TCP:[Continuation to #57]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56644, PayloadLen=1348, Seq=3690003154 - 3690004502, Ack=607082339, Win=260 (scale factor 0x8) = 66560	{TCP:15, IPv4:19}
    59	15:48:08 06.11.2013	10.1873000		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082339, Ack=3690004502, Win=16698 (scale factor 0x2) = 66792	{TCP:15, IPv4:19}
    60	15:48:08 06.11.2013	10.1874600		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082339, Ack=3690004502, Win=16698 (scale factor 0x2) = 66792	{TCP:15, IPv4:19}
    61	15:48:08 06.11.2013	10.1908754		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56646, DstPort=HTTPS(443), PayloadLen=0, Seq=3008580317, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:18, IPv4:19}
    62	15:48:08 06.11.2013	10.2062117		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56644, PayloadLen=0, Seq=3690004502, Ack=607082340, Win=0 (scale factor 0x8) = 0	{TCP:15, IPv4:19}
    63	15:48:08 06.11.2013	10.2088964		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56646, PayloadLen=0, Seq=3667999120, Ack=3008580318, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:18, IPv4:19}
    64	15:48:08 06.11.2013	10.2090132		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56646, DstPort=HTTPS(443), PayloadLen=0, Seq=3008580318, Ack=3667999121, Win=16698 (scale factor 0x2) = 66792	{TCP:18, IPv4:19}
    65	15:48:08 06.11.2013	10.2104799		192.168.1.142	12.345.678.912	SSL	SSL: SSLv3 Rec Layer-1 HandShake: Client Hello.	{SSL:20, SSLVersionSelector:19, TCP:18, IPv4:19}
    66	15:48:08 06.11.2013	10.2301320		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56646, PayloadLen=0, Seq=3667999121, Ack=3008580406, Win=0 (scale factor 0x8) = 0	{TCP:18, IPv4:19}
    67	15:48:08 06.11.2013	10.2339181		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080701995, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:21, IPv4:19}
    68	15:48:08 06.11.2013	10.2527969		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56648, PayloadLen=0, Seq=41020588, Ack=2080701996, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:21, IPv4:19}
    69	15:48:08 06.11.2013	10.2529180		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080701996, Ack=41020589, Win=16698 (scale factor 0x2) = 66792	{TCP:21, IPv4:19}
    70	15:48:08 06.11.2013	10.2543671		192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:23, SSLVersionSelector:22, TCP:21, IPv4:19}
    71	15:48:08 06.11.2013	10.2805646		12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate.	{TLS:23, SSLVersionSelector:22, TCP:21, IPv4:19}
    72	15:48:08 06.11.2013	10.2812033		12.345.678.912	192.168.1.142	TCP	TCP:[Continuation to #71]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56648, PayloadLen=1348, Seq=41022041 - 41023389, Ack=2080702161, Win=260 (scale factor 0x8) = 66560	{TCP:21, IPv4:19}
    73	15:48:08 06.11.2013	10.2812984		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080702161, Ack=41023389, Win=16698 (scale factor 0x2) = 66792	{TCP:21, IPv4:19}
    74	15:48:08 06.11.2013	10.2814406		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080702161, Ack=41023389, Win=16698 (scale factor 0x2) = 66792	{TCP:21, IPv4:19}
    75	15:48:08 06.11.2013	10.2851379		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56650, DstPort=HTTPS(443), PayloadLen=0, Seq=2224213595, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:24, IPv4:19}
    76	15:48:08 06.11.2013	10.3011190		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56648, PayloadLen=0, Seq=41023389, Ack=2080702162, Win=0 (scale factor 0x8) = 0	{TCP:21, IPv4:19}
    77	15:48:08 06.11.2013	10.3238331		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56650, PayloadLen=0, Seq=2100721916, Ack=2224213596, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:24, IPv4:19}
    78	15:48:08 06.11.2013	10.3239611		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56650, DstPort=HTTPS(443), PayloadLen=0, Seq=2224213596, Ack=2100721917, Win=16698 (scale factor 0x2) = 66792	{TCP:24, IPv4:19}
    79	15:48:08 06.11.2013	10.3254863		192.168.1.142	12.345.678.912	SSL	SSL: SSLv3 Rec Layer-1 HandShake: Client Hello.	{SSL:26, SSLVersionSelector:25, TCP:24, IPv4:19}
    80	15:48:08 06.11.2013	10.3438701		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56650, PayloadLen=0, Seq=2100721917, Ack=2224213684, Win=0 (scale factor 0x8) = 0	{TCP:24, IPv4:19}
    81	15:48:08 06.11.2013	10.3475617		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161070988, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:27, IPv4:19}
    82	15:48:08 06.11.2013	10.3652138		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56652, PayloadLen=0, Seq=492713106, Ack=3161070989, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:27, IPv4:19}
    83	15:48:08 06.11.2013	10.3653312		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161070989, Ack=492713107, Win=16698 (scale factor 0x2) = 66792	{TCP:27, IPv4:19}
    84	15:48:08 06.11.2013	10.3669235		192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:29, SSLVersionSelector:28, TCP:27, IPv4:19}
    85	15:48:08 06.11.2013	10.3924122		12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate.	{TLS:29, SSLVersionSelector:28, TCP:27, IPv4:19}
    86	15:48:08 06.11.2013	10.3943168		12.345.678.912	192.168.1.142	TCP	TCP:[Continuation to #85]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56652, PayloadLen=1348, Seq=492714559 - 492715907, Ack=3161071154, Win=260 (scale factor 0x8) = 66560	{TCP:27, IPv4:19}
    87	15:48:08 06.11.2013	10.3943998		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161071154, Ack=492715907, Win=16698 (scale factor 0x2) = 66792	{TCP:27, IPv4:19}
    88	15:48:08 06.11.2013	10.3945773		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161071154, Ack=492715907, Win=16698 (scale factor 0x2) = 66792	{TCP:27, IPv4:19}
    89	15:48:08 06.11.2013	10.3982569		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56654, DstPort=HTTPS(443), PayloadLen=0, Seq=2066161233, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:30, IPv4:19}
    90	15:48:08 06.11.2013	10.4134993		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56652, PayloadLen=0, Seq=492715907, Ack=3161071155, Win=0 (scale factor 0x8) = 0	{TCP:27, IPv4:19}
    91	15:48:08 06.11.2013	10.4186380		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56654, PayloadLen=0, Seq=2002394358, Ack=2066161234, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:30, IPv4:19}
    92	15:48:08 06.11.2013	10.4187237		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56654, DstPort=HTTPS(443), PayloadLen=0, Seq=2066161234, Ack=2002394359, Win=16698 (scale factor 0x2) = 66792	{TCP:30, IPv4:19}
    93	15:48:08 06.11.2013	10.4201744		192.168.1.142	12.345.678.912	SSL	SSL: SSLv3 Rec Layer-1 HandShake: Client Hello.	{SSL:32, SSLVersionSelector:31, TCP:30, IPv4:19}
    94	15:48:08 06.11.2013	10.4419893		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56654, PayloadLen=0, Seq=2002394359, Ack=2066161322, Win=0 (scale factor 0x8) = 0	{TCP:30, IPv4:19}
    95	15:48:08 06.11.2013	10.4455973	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104799, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:33, IPv4:19}
    96	15:48:08 06.11.2013	10.4655604	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56656, PayloadLen=0, Seq=475213790, Ack=2607104800, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:33, IPv4:19}
    97	15:48:08 06.11.2013	10.4656720	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104800, Ack=475213791, Win=16698 (scale factor 0x2) = 66792	{TCP:33, IPv4:19}
    98	15:48:08 06.11.2013	10.4671668	Unavailable	192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:35, SSLVersionSelector:34, TCP:33, IPv4:19}
    99	15:48:08 06.11.2013	10.4965638	Unavailable	12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate.	{TLS:35, SSLVersionSelector:34, TCP:33, IPv4:19}
    100	15:48:08 06.11.2013	10.4973583	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:[Continuation to #99]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56656, PayloadLen=1348, Seq=475215243 - 475216591, Ack=2607104965, Win=260 (scale factor 0x8) = 66560	{TCP:33, IPv4:19}
    101	15:48:08 06.11.2013	10.4974482	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104965, Ack=475216591, Win=16698 (scale factor 0x2) = 66792	{TCP:33, IPv4:19}
    102	15:48:08 06.11.2013	10.4976028	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104965, Ack=475216591, Win=16698 (scale factor 0x2) = 66792	{TCP:33, IPv4:19}
    103	15:48:08 06.11.2013	10.5011356	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56658, DstPort=HTTPS(443), PayloadLen=0, Seq=4218009942, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:36, IPv4:19}
    104	15:48:08 06.11.2013	10.5196534	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56656, PayloadLen=0, Seq=475216591, Ack=2607104966, Win=0 (scale factor 0x8) = 0	{TCP:33, IPv4:19}
    105	15:48:08 06.11.2013	10.5269835	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56658, PayloadLen=0, Seq=920667384, Ack=4218009943, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:36, IPv4:19}
    106	15:48:08 06.11.2013	10.5270985	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56658, DstPort=HTTPS(443), PayloadLen=0, Seq=4218009943, Ack=920667385, Win=16698 (scale factor 0x2) = 66792	{TCP:36, IPv4:19}
    107	15:48:08 06.11.2013	10.5286404	Unavailable	192.168.1.142	12.345.678.912	SSL	SSL: SSLv3 Rec Layer-1 HandShake: Client Hello.	{SSL:38, SSLVersionSelector:37, TCP:36, IPv4:19}
    108	15:48:08 06.11.2013	10.5566000	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56658, PayloadLen=0, Seq=920667385, Ack=4218010031, Win=0 (scale factor 0x8) = 0	{TCP:36, IPv4:19}
    111	15:48:10 06.11.2013	12.7031732	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:[SynReTransmit #34]Flags=......S., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553388, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:5, IPv4:19}
    112	15:48:10 06.11.2013	12.7376591	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=0, Seq=368478769, Ack=1231553389, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:5, IPv4:19}
    113	15:48:10 06.11.2013	12.7377825	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553389, Ack=368478770, Win=16698 (scale factor 0x2) = 66792	{TCP:5, IPv4:19}
    114	15:48:10 06.11.2013	12.7393914	Unavailable	192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:40, SSLVersionSelector:39, TCP:5, IPv4:19}
    115	15:48:10 06.11.2013	12.7742241	Unavailable	12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate.	{TLS:40, SSLVersionSelector:39, TCP:5, IPv4:19}
    116	15:48:10 06.11.2013	12.7751964	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:[Continuation to #115]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=1348, Seq=368480222 - 368481570, Ack=1231553554, Win=260 (scale factor 0x8) = 66560	{TCP:5, IPv4:19}
    117	15:48:10 06.11.2013	12.7752745	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553554, Ack=368481570, Win=16698 (scale factor 0x2) = 66792	{TCP:5, IPv4:19}
    118	15:48:10 06.11.2013	12.7754303	Unavailable	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553554, Ack=368481570, Win=16698 (scale factor 0x2) = 66792	{TCP:5, IPv4:19}
    119	15:48:10 06.11.2013	12.8034026	Unavailable	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=0, Seq=368481570, Ack=1231553555, Win=0 (scale factor 0x8) = 0	{TCP:5, IPv4:19}



    Beim Server lief derweil folgendes ab:

    16776	15:48:05 06.11.2013	16.3385605	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553388, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7284, IPv4:15}
    16777	15:48:05 06.11.2013	16.3392151	System	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=0, Seq=368478769, Ack=1231553389, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7284, IPv4:15}
    17244	15:48:06 06.11.2013	16.5890158	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883163, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7446, IPv4:15}
    17245	15:48:06 06.11.2013	16.5899404	System	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56640, PayloadLen=0, Seq=1489030531, Ack=700883164, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7446, IPv4:15}
    17266	15:48:06 06.11.2013	16.6167016	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883164, Ack=1489030532, Win=16698 (scale factor 0x2) = 66792	{TCP:7446, IPv4:15}
    17271	15:48:06 06.11.2013	16.6190860	System	192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:7459, SSLVersionSelector:7458, TCP:7446, IPv4:15}
    17284	15:48:06 06.11.2013	16.6297424	System	12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done.	{TLS:7459, SSLVersionSelector:7458, TCP:7446, IPv4:15}
    17297	15:48:06 06.11.2013	16.6584577	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883329, Ack=1489033332, Win=16698 (scale factor 0x2) = 66792	{TCP:7446, IPv4:15}
    17298	15:48:06 06.11.2013	16.6589785	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883329, Ack=1489033332, Win=16698 (scale factor 0x2) = 66792	{TCP:7446, IPv4:15}
    17299	15:48:06 06.11.2013	16.6591566	System	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56640, PayloadLen=0, Seq=1489033332, Ack=700883330, Win=0 (scale factor 0x8) = 0	{TCP:7446, IPv4:15}
    17344	15:48:06 06.11.2013	16.7159883		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56642, DstPort=HTTPS(443), PayloadLen=0, Seq=2615148853, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7494, IPv4:15}
    17345	15:48:06 06.11.2013	16.7166747		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56642, PayloadLen=0, Seq=1378787766, Ack=2615148854, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7494, IPv4:15}
    17355	15:48:06 06.11.2013	16.7394822		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56642, DstPort=HTTPS(443), PayloadLen=0, Seq=2615148854, Ack=1378787767, Win=16698 (scale factor 0x2) = 66792	{TCP:7494, IPv4:15}
    17363	15:48:06 06.11.2013	16.7415231		192.168.1.142	12.345.678.912	SSL	SSL: SSLv3 Rec Layer-1 HandShake: Client Hello.	{SSL:7504, SSLVersionSelector:7503, TCP:7494, IPv4:15}
    17364	15:48:06 06.11.2013	16.7421476		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56642, PayloadLen=0, Seq=1378787767, Ack=2615148942, Win=0 (scale factor 0x8) = 0	{TCP:7494, IPv4:15}
    17377	15:48:06 06.11.2013	16.7679746		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082173, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7511, IPv4:15}
    17378	15:48:06 06.11.2013	16.7685284		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56644, PayloadLen=0, Seq=3690001701, Ack=607082174, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7511, IPv4:15}
    17396	15:48:06 06.11.2013	16.7899105		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082174, Ack=3690001702, Win=16698 (scale factor 0x2) = 66792	{TCP:7511, IPv4:15}
    17404	15:48:06 06.11.2013	16.7929311		192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:7524, SSLVersionSelector:7523, TCP:7511, IPv4:15}
    17405	15:48:06 06.11.2013	16.7986433		12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done.	{TLS:7524, SSLVersionSelector:7523, TCP:7511, IPv4:15}
    17438	15:48:06 06.11.2013	16.8206400		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082339, Ack=3690004502, Win=16698 (scale factor 0x2) = 66792	{TCP:7511, IPv4:15}
    17439	15:48:06 06.11.2013	16.8208020		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082339, Ack=3690004502, Win=16698 (scale factor 0x2) = 66792	{TCP:7511, IPv4:15}
    17440	15:48:06 06.11.2013	16.8209255		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56644, PayloadLen=0, Seq=3690004502, Ack=607082340, Win=0 (scale factor 0x8) = 0	{TCP:7511, IPv4:15}
    17445	15:48:06 06.11.2013	16.8242177		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56646, DstPort=HTTPS(443), PayloadLen=0, Seq=3008580317, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7543, IPv4:15}
    17446	15:48:06 06.11.2013	16.8246040		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56646, PayloadLen=0, Seq=3667999120, Ack=3008580318, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7543, IPv4:15}
    17471	15:48:06 06.11.2013	16.8423304		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56646, DstPort=HTTPS(443), PayloadLen=0, Seq=3008580318, Ack=3667999121, Win=16698 (scale factor 0x2) = 66792	{TCP:7543, IPv4:15}
    17472	15:48:06 06.11.2013	16.8442710		192.168.1.142	12.345.678.912	SSL	SSL: SSLv3 Rec Layer-1 HandShake: Client Hello.	{SSL:7557, SSLVersionSelector:7556, TCP:7543, IPv4:15}
    17473	15:48:06 06.11.2013	16.8447822		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56646, PayloadLen=0, Seq=3667999121, Ack=3008580406, Win=0 (scale factor 0x8) = 0	{TCP:7543, IPv4:15}
    17495	15:48:06 06.11.2013	16.8672334		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080701995, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7569, IPv4:15}
    17496	15:48:06 06.11.2013	16.8676289		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56648, PayloadLen=0, Seq=41020588, Ack=2080701996, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7569, IPv4:15}
    17521	15:48:06 06.11.2013	16.8858570		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080701996, Ack=41020589, Win=16698 (scale factor 0x2) = 66792	{TCP:7569, IPv4:15}
    17522	15:48:06 06.11.2013	16.8889773		192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:7583, SSLVersionSelector:7582, TCP:7569, IPv4:15}
    17524	15:48:06 06.11.2013	16.8947272		12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done.	{TLS:7583, SSLVersionSelector:7582, TCP:7569, IPv4:15}
    17536	15:48:06 06.11.2013	16.9147995		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080702161, Ack=41023389, Win=16698 (scale factor 0x2) = 66792	{TCP:7569, IPv4:15}
    17537	15:48:06 06.11.2013	16.9152598		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080702161, Ack=41023389, Win=16698 (scale factor 0x2) = 66792	{TCP:7569, IPv4:15}
    17538	15:48:06 06.11.2013	16.9153903		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56648, PayloadLen=0, Seq=41023389, Ack=2080702162, Win=0 (scale factor 0x8) = 0	{TCP:7569, IPv4:15}
    17559	15:48:06 06.11.2013	16.9390836		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56650, DstPort=HTTPS(443), PayloadLen=0, Seq=2224213595, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7600, IPv4:15}
    17560	15:48:06 06.11.2013	16.9394761		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56650, PayloadLen=0, Seq=2100721916, Ack=2224213596, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7600, IPv4:15}
    17579	15:48:06 06.11.2013	16.9573095		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56650, DstPort=HTTPS(443), PayloadLen=0, Seq=2224213596, Ack=2100721917, Win=16698 (scale factor 0x2) = 66792	{TCP:7600, IPv4:15}
    17591	15:48:06 06.11.2013	16.9594912		192.168.1.142	12.345.678.912	SSL	SSL: SSLv3 Rec Layer-1 HandShake: Client Hello.	{SSL:7618, SSLVersionSelector:7617, TCP:7600, IPv4:15}
    17595	15:48:06 06.11.2013	16.9600483		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56650, PayloadLen=0, Seq=2100721917, Ack=2224213684, Win=0 (scale factor 0x8) = 0	{TCP:7600, IPv4:15}
    17628	15:48:06 06.11.2013	16.9818647		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161070988, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7627, IPv4:15}
    17629	15:48:06 06.11.2013	16.9822558		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56652, PayloadLen=0, Seq=492713106, Ack=3161070989, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7627, IPv4:15}
    17647	15:48:06 06.11.2013	16.9978525		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161070989, Ack=492713107, Win=16698 (scale factor 0x2) = 66792	{TCP:7627, IPv4:15}
    17651	15:48:06 06.11.2013	17.0018154		192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:7639, SSLVersionSelector:7638, TCP:7627, IPv4:15}
    17656	15:48:06 06.11.2013	17.0075517		12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done.	{TLS:7639, SSLVersionSelector:7638, TCP:7627, IPv4:15}
    17673	15:48:06 06.11.2013	17.0286546		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161071154, Ack=492715907, Win=16698 (scale factor 0x2) = 66792	{TCP:7627, IPv4:15}
    17674	15:48:06 06.11.2013	17.0291838		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161071154, Ack=492715907, Win=16698 (scale factor 0x2) = 66792	{TCP:7627, IPv4:15}
    17675	15:48:06 06.11.2013	17.0292872		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56652, PayloadLen=0, Seq=492715907, Ack=3161071155, Win=0 (scale factor 0x8) = 0	{TCP:7627, IPv4:15}
    17676	15:48:06 06.11.2013	17.0314982		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56654, DstPort=HTTPS(443), PayloadLen=0, Seq=2066161233, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7646, IPv4:15}
    17677	15:48:06 06.11.2013	17.0318475		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56654, PayloadLen=0, Seq=2002394358, Ack=2066161234, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7646, IPv4:15}
    17695	15:48:06 06.11.2013	17.0523515		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56654, DstPort=HTTPS(443), PayloadLen=0, Seq=2066161234, Ack=2002394359, Win=16698 (scale factor 0x2) = 66792	{TCP:7646, IPv4:15}
    17699	15:48:06 06.11.2013	17.0538702		192.168.1.142	12.345.678.912	SSL	SSL: SSLv3 Rec Layer-1 HandShake: Client Hello.	{SSL:7658, SSLVersionSelector:7657, TCP:7646, IPv4:15}
    17701	15:48:06 06.11.2013	17.0543947		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56654, PayloadLen=0, Seq=2002394359, Ack=2066161322, Win=0 (scale factor 0x8) = 0	{TCP:7646, IPv4:15}
    17751	15:48:06 06.11.2013	17.0796653	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104799, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7683, IPv4:15}
    17755	15:48:06 06.11.2013	17.0800380	System	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56656, PayloadLen=0, Seq=475213790, Ack=2607104800, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7683, IPv4:15}
    17779	15:48:06 06.11.2013	17.0990831	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104800, Ack=475213791, Win=16698 (scale factor 0x2) = 66792	{TCP:7683, IPv4:15}
    17781	15:48:06 06.11.2013	17.1019663	System	192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:7696, SSLVersionSelector:7695, TCP:7683, IPv4:15}
    17785	15:48:06 06.11.2013	17.1076414	System	12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done.	{TLS:7696, SSLVersionSelector:7695, TCP:7683, IPv4:15}
    17814	15:48:06 06.11.2013	17.1303876	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104965, Ack=475216591, Win=16698 (scale factor 0x2) = 66792	{TCP:7683, IPv4:15}
    17815	15:48:06 06.11.2013	17.1311770	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104965, Ack=475216591, Win=16698 (scale factor 0x2) = 66792	{TCP:7683, IPv4:15}
    17816	15:48:06 06.11.2013	17.1312837	System	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56656, PayloadLen=0, Seq=475216591, Ack=2607104966, Win=0 (scale factor 0x8) = 0	{TCP:7683, IPv4:15}
    17818	15:48:06 06.11.2013	17.1347276		192.168.1.142	12.345.678.912	TCP	TCP:Flags=......S., SrcPort=56658, DstPort=HTTPS(443), PayloadLen=0, Seq=4218009942, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7711, IPv4:15}
    17822	15:48:06 06.11.2013	17.1351271		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56658, PayloadLen=0, Seq=920667384, Ack=4218009943, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7711, IPv4:15}
    17851	15:48:06 06.11.2013	17.1601925		192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56658, DstPort=HTTPS(443), PayloadLen=0, Seq=4218009943, Ack=920667385, Win=16698 (scale factor 0x2) = 66792	{TCP:7711, IPv4:15}
    17852	15:48:06 06.11.2013	17.1624127		192.168.1.142	12.345.678.912	SSL	SSL: SSLv3 Rec Layer-1 HandShake: Client Hello.	{SSL:7727, SSLVersionSelector:7726, TCP:7711, IPv4:15}
    17857	15:48:06 06.11.2013	17.1636972		12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56658, PayloadLen=0, Seq=920667385, Ack=4218010031, Win=0 (scale factor 0x8) = 0	{TCP:7711, IPv4:15}
    20499	15:48:08 06.11.2013	19.3359991	System	192.168.1.142	12.345.678.912	TCP	TCP:[SynReTransmit #16776]Flags=......S., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553388, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192	{TCP:7284, IPv4:15}
    20504	15:48:08 06.11.2013	19.3439314	System	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=0, Seq=368478769, Ack=1231553389, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152	{TCP:7284, IPv4:15}
    20557	15:48:08 06.11.2013	19.3708879	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553389, Ack=368478770, Win=16698 (scale factor 0x2) = 66792	{TCP:7284, IPv4:15}
    20562	15:48:08 06.11.2013	19.3737707	System	192.168.1.142	12.345.678.912	TLS	TLS:TLS Rec Layer-1 HandShake: Client Hello.	{TLS:8777, SSLVersionSelector:8776, TCP:7284, IPv4:15}
    20567	15:48:08 06.11.2013	19.3796078	System	12.345.678.912	192.168.1.142	TLS	TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done.	{TLS:8777, SSLVersionSelector:8776, TCP:7284, IPv4:15}
    20580	15:48:08 06.11.2013	19.4092697	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553554, Ack=368481570, Win=16698 (scale factor 0x2) = 66792	{TCP:7284, IPv4:15}
    20581	15:48:08 06.11.2013	19.4096406	System	192.168.1.142	12.345.678.912	TCP	TCP:Flags=...A...F, SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553554, Ack=368481570, Win=16698 (scale factor 0x2) = 66792	{TCP:7284, IPv4:15}
    20582	15:48:08 06.11.2013	19.4097638	System	12.345.678.912	192.168.1.142	TCP	TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=0, Seq=368481570, Ack=1231553555, Win=0 (scale factor 0x8) = 0	{TCP:7284, IPv4:15}

    Kann damit jemand was anfangen?

    Ich verstehe nur, das an einer bestimmten Stelle scheinbar ein Reset stattfindet und neu verhandelt wird...

    Oder sehe ich das falsch?


    • Bearbeitet apfelsine Mittwoch, 6. November 2013 15:59
    Mittwoch, 6. November 2013 15:54