Fragensteller
AD LDS: LDAPS keine SSL-Verbindung

Allgemeine Diskussion
-
Hi,
ich habe das Problem, das keine LDAPS Verbindung zu einer AD LDS Instanzen aufgebaut werden kann. Besser gesagt, es kann keine externe SSL Verbindung initiiert werden.
Die Zertifikate sind richtig hinterlegt, selbsigniert von einer nicht Microsoft CA und auch mit den certutils überprüft. Eine lokale Verbindung via ldp.exe mit SSL auf den SSL Port der ADAM Instanz funktioniert, auch auf das "normale" AD (Server ist zugleich Domain Controller) funktioniert die Verbindung und ich erhalte die Anmeldung im Fenster. Jedoch, wie gesagt, von extern via openssl nicht. Auch keine LDAPS Search. Mir wird das Zertifikat vom Server nicht ausgegeben. Zudem erscheint bei jedem Verbindungsaufbau unten stehende Fehlermeldung im Log des Servers.
Fehlermeldung im Log vom Windows 2008 R2 Server:
Eine TLS 1.0-Verbindungsanforderung wurde von einer Remoteclientanwendung übermittelt, jedoch werden keine der Verschlüsselungssammlungen, die von der Clientanwendung unterstützt werden, vom Server unterstützt. Fehler bei der SSL-Verbindungsanforderung.
Ereigniss-ID: 36874
Wie kann ich TLS 1.0 für den Server "aktivieren"? Wer kann mir helfen?
- Typ geändert Raul TalmaciuMicrosoft contingent staff Montag, 4. Februar 2013 09:55 Warten auf Feedback
Alle Antworten
-
Am 29.01.2013 20:31, schrieb Mitarbeiter-007:> Jedoch, wie gesagt, von extern via openssl nicht. Auch keine LDAPS Search.Was hat openssl mit LDAPS zu tun? mfg Martin
NO THEY ARE NOT EVIL, if you know what you are doing: Good or bad GPOs?
Wenn meine Antwort hilfreich war, freue ich mich über eine Bewertung! If my answer was helpful, I'm glad about a rating! -
Am 29.01.2013 20:31, schrieb Mitarbeiter-007:Jedoch, wie gesagt, von extern via openssl nicht
Gehts denn intern via ldp.exe -> Verbinden "SSL"
Tschö
mark
Mark Heitbrink - MVP Windows Server - Group Policy
Homepage: www.gruppenrichtlinien.de - deutsch
GPO Tool: www.reg2xml.com - Registry Export File Converter
NetworkTrayTool www.gruppenrichtlinien.de/tools/Networktraytool.htm -
@ Martin: Naja, was ist denn LDAPS --> LDAP over SSL und wenn ich beim connect mit openssl auf den LDAPS Port schon nicht das öffentliche Zertifikat sehe bzw. schon der Handshake beim Server-Hello scheitert, scheint irgendetwas an der SSL Konfiguration nicht zu stimmen. Und das egal, mit welcher SSL Version / TLS Version.
@Mark: Das ist ja das dubiose. Verbinden via ldp.exe mit "Häckchen" SSL auf den LDAPS Port funktioniert. Es scheitert jedoch eine extern aufgebaute LDAPS Verbindung. Auf dem Domaincontroller ist im Eventlog zu sehen, das openssl versucht eine TLS 1.0 Verbindung aufzubauen die wiederum mit der Fehlermeldung
"Eine TLS 1.0-Verbindungsanforderung wurde von einer Remoteclientanwendung übermittelt, jedoch werden keine der Verschlüsselungssammlungen, die von der Clientanwendung unterstützt werden, vom Server unterstützt. Fehler bei der SSL-Verbindungsanforderung.
Ereigniss-ID: 36874"
abgewiesen wird.
Wir haben noch einen DC, auf dem der externe openssl als auch ldapsearch connect funktioniert, auf dem auf gleicher Weise die Zertifikate hinzugefügt wurden, als auch die Registryeinträge unter [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 1.0\] identisch sind.
Daher meine Frage, warum werden TLS 1.0 als auch SSLv2/SSLv3 Anfragen abgewiesen, bzw. was ist auf dem DC weitergehend noch zu konfigurieren, habt Ihr eine Idee?
-
Am 30.01.2013 09:54, schrieb Mitarbeiter-007:> Wir haben noch einen DC, auf dem der externe openssl als auch> ldapsearch connect funktioniert, auf dem auf gleicher Weise die> Zertifikate hinzugefügt wurden//Gleiches OS?
NO THEY ARE NOT EVIL, if you know what you are doing: Good or bad GPOs?
Wenn meine Antwort hilfreich war, freue ich mich über eine Bewertung! If my answer was helpful, I'm glad about a rating! -
Hallo,
bist Du inzwischen weitergekommen?
Gruss,
RaulRaul Talmaciu, MICROSOFT
Bitte haben Sie Verständnis dafür, dass im Rahmen dieses Forums, welches auf dem Community-Prinzip „IT-Pros helfen IT-Pros“ beruht, kein technischer Support geleistet werden kann oder sonst welche garantierten Maßnahmen seitens Microsoft zugesichert werden können. -
Hallo,
ich habe ein SSL Zertifikat ausgetauscht und seitdem diese Meldung im Ereignisprotokoll, zusammen mit
einer anderen.
"Eine SSL 3.0-Verbindungsanforderung wurde von einer Remoteclientanwendung übermittelt, jedoch werden keine der Verschlüsselungssammlungen, die von der Clientanwendung unterstützt werden, vom Server unterstützt. Fehler bei der SSL-Verbindungsanforderung."
Bei uns funktioniert die Webseite nicht bei jedem.
Manche können die Webseite anzeigen andere Clients nicht.
Habt ihr das Problem gelöst?
Grüße
apfelsine
-
Schau in folgenden Artikel unter "Cause" und "Workaround" bzgl. den Hintergründen und ob Ihr davon betroffen seit. Der Hotfix spielt erst mal keine Rolle.
Clients cannot make connections if you require client certificates on a Web site
http://support.microsoft.com/kb/933430/en-usAnsonsten scheint der Server Etypes anzubieten die nicht alle Clients bei euch unterstützen können - s.a.:
How TLS/SSL Works
http://technet.microsoft.com/en-us/library/cc783349.aspx#w2k3tr_schan_how_hkrr
-> Handshake and Cipher Suite Negotiation ff.Zu sehen in einem Network-Trace. CAPI2-Monitoring ab Windows 7 ist ggf. auch aufschlussreich.
S.a.:
Troubleshooting LDAP Over SSL
http://blogs.technet.com/b/askds/archive/2008/03/13/troubleshooting-ldap-over-ssl.aspxReading LDAP SSL Network Traffic with NetMon 3.4 and NMDecrypt
http://blogs.technet.com/b/askds/archive/2010/11/17/reading-ldap-ssl-network-traffic-with-netmon-3-4-and-nmdecrypt.aspxTroubleshooting PKI Problems
http://technet.microsoft.com/en-us/library/cc749296.aspx
-> Enable CAPI2 Logging--
Tobias RedelbergerStarNET Services (HomeOffice)Frankfurter Allee 193D-10365 BerlinTel: +49 (30) 86 87 02 678Mobil: +49 (163) 84 74 421- Bearbeitet Tobias Redelberger Donnerstag, 31. Oktober 2013 16:54
-
Ich habe festgestellt, das in der Konsole unter den Stammzertifizierungsstellen noch das alte Zertifikat angezeigt wird, obwohl ich es aus der Liste im IIS entfernt hatte...
führt das evtl. zu einem Problem? Das alte Zertifikat ist natürlich abgelaufen.
Ich habe bei einem Client-Browser wo ich die Internet-Seite nicht laden kann den Netzwerk Monitor mitlaufen lassen und der hat beim Client folgendes aufgezeichnet:
34 15:48:07 06.11.2013 9.7038050 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553388, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:5, IPv4:19} 35 15:48:08 06.11.2013 9.9543490 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883163, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:6, IPv4:19} 36 15:48:08 06.11.2013 9.9802953 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56640, PayloadLen=0, Seq=1489030531, Ack=700883164, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:6, IPv4:19} 37 15:48:08 06.11.2013 9.9804341 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883164, Ack=1489030532, Win=16698 (scale factor 0x2) = 66792 {TCP:6, IPv4:19} 38 15:48:08 06.11.2013 9.9824441 Unavailable 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:8, SSLVersionSelector:7, TCP:6, IPv4:19} 39 15:48:08 06.11.2013 10.0250739 Unavailable 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. {TLS:8, SSLVersionSelector:7, TCP:6, IPv4:19} 40 15:48:08 06.11.2013 10.0256552 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:[Continuation to #39]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56640, PayloadLen=1348, Seq=1489031984 - 1489033332, Ack=700883329, Win=260 (scale factor 0x8) = 66560 {TCP:6, IPv4:19} 41 15:48:08 06.11.2013 10.0257373 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883329, Ack=1489033332, Win=16698 (scale factor 0x2) = 66792 {TCP:6, IPv4:19} 42 15:48:08 06.11.2013 10.0259218 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883329, Ack=1489033332, Win=16698 (scale factor 0x2) = 66792 {TCP:6, IPv4:19} 46 15:48:08 06.11.2013 10.0516891 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56640, PayloadLen=0, Seq=1489033332, Ack=700883330, Win=0 (scale factor 0x8) = 0 {TCP:6, IPv4:19} 48 15:48:08 06.11.2013 10.0828547 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56642, DstPort=HTTPS(443), PayloadLen=0, Seq=2615148853, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:12, IPv4:19} 49 15:48:08 06.11.2013 10.1062853 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56642, PayloadLen=0, Seq=1378787766, Ack=2615148854, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:12, IPv4:19} 50 15:48:08 06.11.2013 10.1064121 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56642, DstPort=HTTPS(443), PayloadLen=0, Seq=2615148854, Ack=1378787767, Win=16698 (scale factor 0x2) = 66792 {TCP:12, IPv4:19} 51 15:48:08 06.11.2013 10.1079854 192.168.1.142 12.345.678.912 SSL SSL: SSLv3 Rec Layer-1 HandShake: Client Hello. {SSL:14, SSLVersionSelector:13, TCP:12, IPv4:19} 52 15:48:08 06.11.2013 10.1306427 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56642, PayloadLen=0, Seq=1378787767, Ack=2615148942, Win=0 (scale factor 0x8) = 0 {TCP:12, IPv4:19} 53 15:48:08 06.11.2013 10.1342208 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082173, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:15, IPv4:19} 54 15:48:08 06.11.2013 10.1570089 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56644, PayloadLen=0, Seq=3690001701, Ack=607082174, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:15, IPv4:19} 55 15:48:08 06.11.2013 10.1571378 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082174, Ack=3690001702, Win=16698 (scale factor 0x2) = 66792 {TCP:15, IPv4:19} 56 15:48:08 06.11.2013 10.1586576 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:17, SSLVersionSelector:16, TCP:15, IPv4:19} 57 15:48:08 06.11.2013 10.1863776 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. {TLS:17, SSLVersionSelector:16, TCP:15, IPv4:19} 58 15:48:08 06.11.2013 10.1872285 12.345.678.912 192.168.1.142 TCP TCP:[Continuation to #57]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56644, PayloadLen=1348, Seq=3690003154 - 3690004502, Ack=607082339, Win=260 (scale factor 0x8) = 66560 {TCP:15, IPv4:19} 59 15:48:08 06.11.2013 10.1873000 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082339, Ack=3690004502, Win=16698 (scale factor 0x2) = 66792 {TCP:15, IPv4:19} 60 15:48:08 06.11.2013 10.1874600 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082339, Ack=3690004502, Win=16698 (scale factor 0x2) = 66792 {TCP:15, IPv4:19} 61 15:48:08 06.11.2013 10.1908754 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56646, DstPort=HTTPS(443), PayloadLen=0, Seq=3008580317, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:18, IPv4:19} 62 15:48:08 06.11.2013 10.2062117 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56644, PayloadLen=0, Seq=3690004502, Ack=607082340, Win=0 (scale factor 0x8) = 0 {TCP:15, IPv4:19} 63 15:48:08 06.11.2013 10.2088964 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56646, PayloadLen=0, Seq=3667999120, Ack=3008580318, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:18, IPv4:19} 64 15:48:08 06.11.2013 10.2090132 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56646, DstPort=HTTPS(443), PayloadLen=0, Seq=3008580318, Ack=3667999121, Win=16698 (scale factor 0x2) = 66792 {TCP:18, IPv4:19} 65 15:48:08 06.11.2013 10.2104799 192.168.1.142 12.345.678.912 SSL SSL: SSLv3 Rec Layer-1 HandShake: Client Hello. {SSL:20, SSLVersionSelector:19, TCP:18, IPv4:19} 66 15:48:08 06.11.2013 10.2301320 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56646, PayloadLen=0, Seq=3667999121, Ack=3008580406, Win=0 (scale factor 0x8) = 0 {TCP:18, IPv4:19} 67 15:48:08 06.11.2013 10.2339181 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080701995, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:21, IPv4:19} 68 15:48:08 06.11.2013 10.2527969 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56648, PayloadLen=0, Seq=41020588, Ack=2080701996, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:21, IPv4:19} 69 15:48:08 06.11.2013 10.2529180 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080701996, Ack=41020589, Win=16698 (scale factor 0x2) = 66792 {TCP:21, IPv4:19} 70 15:48:08 06.11.2013 10.2543671 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:23, SSLVersionSelector:22, TCP:21, IPv4:19} 71 15:48:08 06.11.2013 10.2805646 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. {TLS:23, SSLVersionSelector:22, TCP:21, IPv4:19} 72 15:48:08 06.11.2013 10.2812033 12.345.678.912 192.168.1.142 TCP TCP:[Continuation to #71]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56648, PayloadLen=1348, Seq=41022041 - 41023389, Ack=2080702161, Win=260 (scale factor 0x8) = 66560 {TCP:21, IPv4:19} 73 15:48:08 06.11.2013 10.2812984 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080702161, Ack=41023389, Win=16698 (scale factor 0x2) = 66792 {TCP:21, IPv4:19} 74 15:48:08 06.11.2013 10.2814406 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080702161, Ack=41023389, Win=16698 (scale factor 0x2) = 66792 {TCP:21, IPv4:19} 75 15:48:08 06.11.2013 10.2851379 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56650, DstPort=HTTPS(443), PayloadLen=0, Seq=2224213595, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:24, IPv4:19} 76 15:48:08 06.11.2013 10.3011190 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56648, PayloadLen=0, Seq=41023389, Ack=2080702162, Win=0 (scale factor 0x8) = 0 {TCP:21, IPv4:19} 77 15:48:08 06.11.2013 10.3238331 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56650, PayloadLen=0, Seq=2100721916, Ack=2224213596, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:24, IPv4:19} 78 15:48:08 06.11.2013 10.3239611 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56650, DstPort=HTTPS(443), PayloadLen=0, Seq=2224213596, Ack=2100721917, Win=16698 (scale factor 0x2) = 66792 {TCP:24, IPv4:19} 79 15:48:08 06.11.2013 10.3254863 192.168.1.142 12.345.678.912 SSL SSL: SSLv3 Rec Layer-1 HandShake: Client Hello. {SSL:26, SSLVersionSelector:25, TCP:24, IPv4:19} 80 15:48:08 06.11.2013 10.3438701 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56650, PayloadLen=0, Seq=2100721917, Ack=2224213684, Win=0 (scale factor 0x8) = 0 {TCP:24, IPv4:19} 81 15:48:08 06.11.2013 10.3475617 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161070988, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:27, IPv4:19} 82 15:48:08 06.11.2013 10.3652138 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56652, PayloadLen=0, Seq=492713106, Ack=3161070989, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:27, IPv4:19} 83 15:48:08 06.11.2013 10.3653312 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161070989, Ack=492713107, Win=16698 (scale factor 0x2) = 66792 {TCP:27, IPv4:19} 84 15:48:08 06.11.2013 10.3669235 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:29, SSLVersionSelector:28, TCP:27, IPv4:19} 85 15:48:08 06.11.2013 10.3924122 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. {TLS:29, SSLVersionSelector:28, TCP:27, IPv4:19} 86 15:48:08 06.11.2013 10.3943168 12.345.678.912 192.168.1.142 TCP TCP:[Continuation to #85]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56652, PayloadLen=1348, Seq=492714559 - 492715907, Ack=3161071154, Win=260 (scale factor 0x8) = 66560 {TCP:27, IPv4:19} 87 15:48:08 06.11.2013 10.3943998 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161071154, Ack=492715907, Win=16698 (scale factor 0x2) = 66792 {TCP:27, IPv4:19} 88 15:48:08 06.11.2013 10.3945773 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161071154, Ack=492715907, Win=16698 (scale factor 0x2) = 66792 {TCP:27, IPv4:19} 89 15:48:08 06.11.2013 10.3982569 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56654, DstPort=HTTPS(443), PayloadLen=0, Seq=2066161233, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:30, IPv4:19} 90 15:48:08 06.11.2013 10.4134993 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56652, PayloadLen=0, Seq=492715907, Ack=3161071155, Win=0 (scale factor 0x8) = 0 {TCP:27, IPv4:19} 91 15:48:08 06.11.2013 10.4186380 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56654, PayloadLen=0, Seq=2002394358, Ack=2066161234, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:30, IPv4:19} 92 15:48:08 06.11.2013 10.4187237 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56654, DstPort=HTTPS(443), PayloadLen=0, Seq=2066161234, Ack=2002394359, Win=16698 (scale factor 0x2) = 66792 {TCP:30, IPv4:19} 93 15:48:08 06.11.2013 10.4201744 192.168.1.142 12.345.678.912 SSL SSL: SSLv3 Rec Layer-1 HandShake: Client Hello. {SSL:32, SSLVersionSelector:31, TCP:30, IPv4:19} 94 15:48:08 06.11.2013 10.4419893 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56654, PayloadLen=0, Seq=2002394359, Ack=2066161322, Win=0 (scale factor 0x8) = 0 {TCP:30, IPv4:19} 95 15:48:08 06.11.2013 10.4455973 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104799, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:33, IPv4:19} 96 15:48:08 06.11.2013 10.4655604 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56656, PayloadLen=0, Seq=475213790, Ack=2607104800, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:33, IPv4:19} 97 15:48:08 06.11.2013 10.4656720 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104800, Ack=475213791, Win=16698 (scale factor 0x2) = 66792 {TCP:33, IPv4:19} 98 15:48:08 06.11.2013 10.4671668 Unavailable 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:35, SSLVersionSelector:34, TCP:33, IPv4:19} 99 15:48:08 06.11.2013 10.4965638 Unavailable 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. {TLS:35, SSLVersionSelector:34, TCP:33, IPv4:19} 100 15:48:08 06.11.2013 10.4973583 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:[Continuation to #99]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56656, PayloadLen=1348, Seq=475215243 - 475216591, Ack=2607104965, Win=260 (scale factor 0x8) = 66560 {TCP:33, IPv4:19} 101 15:48:08 06.11.2013 10.4974482 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104965, Ack=475216591, Win=16698 (scale factor 0x2) = 66792 {TCP:33, IPv4:19} 102 15:48:08 06.11.2013 10.4976028 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104965, Ack=475216591, Win=16698 (scale factor 0x2) = 66792 {TCP:33, IPv4:19} 103 15:48:08 06.11.2013 10.5011356 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56658, DstPort=HTTPS(443), PayloadLen=0, Seq=4218009942, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:36, IPv4:19} 104 15:48:08 06.11.2013 10.5196534 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56656, PayloadLen=0, Seq=475216591, Ack=2607104966, Win=0 (scale factor 0x8) = 0 {TCP:33, IPv4:19} 105 15:48:08 06.11.2013 10.5269835 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56658, PayloadLen=0, Seq=920667384, Ack=4218009943, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:36, IPv4:19} 106 15:48:08 06.11.2013 10.5270985 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56658, DstPort=HTTPS(443), PayloadLen=0, Seq=4218009943, Ack=920667385, Win=16698 (scale factor 0x2) = 66792 {TCP:36, IPv4:19} 107 15:48:08 06.11.2013 10.5286404 Unavailable 192.168.1.142 12.345.678.912 SSL SSL: SSLv3 Rec Layer-1 HandShake: Client Hello. {SSL:38, SSLVersionSelector:37, TCP:36, IPv4:19} 108 15:48:08 06.11.2013 10.5566000 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56658, PayloadLen=0, Seq=920667385, Ack=4218010031, Win=0 (scale factor 0x8) = 0 {TCP:36, IPv4:19} 111 15:48:10 06.11.2013 12.7031732 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:[SynReTransmit #34]Flags=......S., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553388, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:5, IPv4:19} 112 15:48:10 06.11.2013 12.7376591 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=0, Seq=368478769, Ack=1231553389, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:5, IPv4:19} 113 15:48:10 06.11.2013 12.7377825 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553389, Ack=368478770, Win=16698 (scale factor 0x2) = 66792 {TCP:5, IPv4:19} 114 15:48:10 06.11.2013 12.7393914 Unavailable 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:40, SSLVersionSelector:39, TCP:5, IPv4:19} 115 15:48:10 06.11.2013 12.7742241 Unavailable 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. {TLS:40, SSLVersionSelector:39, TCP:5, IPv4:19} 116 15:48:10 06.11.2013 12.7751964 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:[Continuation to #115]Flags=...AP..., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=1348, Seq=368480222 - 368481570, Ack=1231553554, Win=260 (scale factor 0x8) = 66560 {TCP:5, IPv4:19} 117 15:48:10 06.11.2013 12.7752745 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553554, Ack=368481570, Win=16698 (scale factor 0x2) = 66792 {TCP:5, IPv4:19} 118 15:48:10 06.11.2013 12.7754303 Unavailable 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553554, Ack=368481570, Win=16698 (scale factor 0x2) = 66792 {TCP:5, IPv4:19} 119 15:48:10 06.11.2013 12.8034026 Unavailable 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=0, Seq=368481570, Ack=1231553555, Win=0 (scale factor 0x8) = 0 {TCP:5, IPv4:19}
Beim Server lief derweil folgendes ab:
16776 15:48:05 06.11.2013 16.3385605 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553388, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7284, IPv4:15} 16777 15:48:05 06.11.2013 16.3392151 System 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=0, Seq=368478769, Ack=1231553389, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7284, IPv4:15} 17244 15:48:06 06.11.2013 16.5890158 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883163, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7446, IPv4:15} 17245 15:48:06 06.11.2013 16.5899404 System 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56640, PayloadLen=0, Seq=1489030531, Ack=700883164, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7446, IPv4:15} 17266 15:48:06 06.11.2013 16.6167016 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883164, Ack=1489030532, Win=16698 (scale factor 0x2) = 66792 {TCP:7446, IPv4:15} 17271 15:48:06 06.11.2013 16.6190860 System 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:7459, SSLVersionSelector:7458, TCP:7446, IPv4:15} 17284 15:48:06 06.11.2013 16.6297424 System 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done. {TLS:7459, SSLVersionSelector:7458, TCP:7446, IPv4:15} 17297 15:48:06 06.11.2013 16.6584577 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883329, Ack=1489033332, Win=16698 (scale factor 0x2) = 66792 {TCP:7446, IPv4:15} 17298 15:48:06 06.11.2013 16.6589785 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56640, DstPort=HTTPS(443), PayloadLen=0, Seq=700883329, Ack=1489033332, Win=16698 (scale factor 0x2) = 66792 {TCP:7446, IPv4:15} 17299 15:48:06 06.11.2013 16.6591566 System 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56640, PayloadLen=0, Seq=1489033332, Ack=700883330, Win=0 (scale factor 0x8) = 0 {TCP:7446, IPv4:15} 17344 15:48:06 06.11.2013 16.7159883 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56642, DstPort=HTTPS(443), PayloadLen=0, Seq=2615148853, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7494, IPv4:15} 17345 15:48:06 06.11.2013 16.7166747 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56642, PayloadLen=0, Seq=1378787766, Ack=2615148854, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7494, IPv4:15} 17355 15:48:06 06.11.2013 16.7394822 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56642, DstPort=HTTPS(443), PayloadLen=0, Seq=2615148854, Ack=1378787767, Win=16698 (scale factor 0x2) = 66792 {TCP:7494, IPv4:15} 17363 15:48:06 06.11.2013 16.7415231 192.168.1.142 12.345.678.912 SSL SSL: SSLv3 Rec Layer-1 HandShake: Client Hello. {SSL:7504, SSLVersionSelector:7503, TCP:7494, IPv4:15} 17364 15:48:06 06.11.2013 16.7421476 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56642, PayloadLen=0, Seq=1378787767, Ack=2615148942, Win=0 (scale factor 0x8) = 0 {TCP:7494, IPv4:15} 17377 15:48:06 06.11.2013 16.7679746 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082173, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7511, IPv4:15} 17378 15:48:06 06.11.2013 16.7685284 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56644, PayloadLen=0, Seq=3690001701, Ack=607082174, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7511, IPv4:15} 17396 15:48:06 06.11.2013 16.7899105 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082174, Ack=3690001702, Win=16698 (scale factor 0x2) = 66792 {TCP:7511, IPv4:15} 17404 15:48:06 06.11.2013 16.7929311 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:7524, SSLVersionSelector:7523, TCP:7511, IPv4:15} 17405 15:48:06 06.11.2013 16.7986433 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done. {TLS:7524, SSLVersionSelector:7523, TCP:7511, IPv4:15} 17438 15:48:06 06.11.2013 16.8206400 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082339, Ack=3690004502, Win=16698 (scale factor 0x2) = 66792 {TCP:7511, IPv4:15} 17439 15:48:06 06.11.2013 16.8208020 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56644, DstPort=HTTPS(443), PayloadLen=0, Seq=607082339, Ack=3690004502, Win=16698 (scale factor 0x2) = 66792 {TCP:7511, IPv4:15} 17440 15:48:06 06.11.2013 16.8209255 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56644, PayloadLen=0, Seq=3690004502, Ack=607082340, Win=0 (scale factor 0x8) = 0 {TCP:7511, IPv4:15} 17445 15:48:06 06.11.2013 16.8242177 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56646, DstPort=HTTPS(443), PayloadLen=0, Seq=3008580317, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7543, IPv4:15} 17446 15:48:06 06.11.2013 16.8246040 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56646, PayloadLen=0, Seq=3667999120, Ack=3008580318, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7543, IPv4:15} 17471 15:48:06 06.11.2013 16.8423304 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56646, DstPort=HTTPS(443), PayloadLen=0, Seq=3008580318, Ack=3667999121, Win=16698 (scale factor 0x2) = 66792 {TCP:7543, IPv4:15} 17472 15:48:06 06.11.2013 16.8442710 192.168.1.142 12.345.678.912 SSL SSL: SSLv3 Rec Layer-1 HandShake: Client Hello. {SSL:7557, SSLVersionSelector:7556, TCP:7543, IPv4:15} 17473 15:48:06 06.11.2013 16.8447822 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56646, PayloadLen=0, Seq=3667999121, Ack=3008580406, Win=0 (scale factor 0x8) = 0 {TCP:7543, IPv4:15} 17495 15:48:06 06.11.2013 16.8672334 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080701995, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7569, IPv4:15} 17496 15:48:06 06.11.2013 16.8676289 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56648, PayloadLen=0, Seq=41020588, Ack=2080701996, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7569, IPv4:15} 17521 15:48:06 06.11.2013 16.8858570 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080701996, Ack=41020589, Win=16698 (scale factor 0x2) = 66792 {TCP:7569, IPv4:15} 17522 15:48:06 06.11.2013 16.8889773 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:7583, SSLVersionSelector:7582, TCP:7569, IPv4:15} 17524 15:48:06 06.11.2013 16.8947272 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done. {TLS:7583, SSLVersionSelector:7582, TCP:7569, IPv4:15} 17536 15:48:06 06.11.2013 16.9147995 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080702161, Ack=41023389, Win=16698 (scale factor 0x2) = 66792 {TCP:7569, IPv4:15} 17537 15:48:06 06.11.2013 16.9152598 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56648, DstPort=HTTPS(443), PayloadLen=0, Seq=2080702161, Ack=41023389, Win=16698 (scale factor 0x2) = 66792 {TCP:7569, IPv4:15} 17538 15:48:06 06.11.2013 16.9153903 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56648, PayloadLen=0, Seq=41023389, Ack=2080702162, Win=0 (scale factor 0x8) = 0 {TCP:7569, IPv4:15} 17559 15:48:06 06.11.2013 16.9390836 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56650, DstPort=HTTPS(443), PayloadLen=0, Seq=2224213595, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7600, IPv4:15} 17560 15:48:06 06.11.2013 16.9394761 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56650, PayloadLen=0, Seq=2100721916, Ack=2224213596, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7600, IPv4:15} 17579 15:48:06 06.11.2013 16.9573095 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56650, DstPort=HTTPS(443), PayloadLen=0, Seq=2224213596, Ack=2100721917, Win=16698 (scale factor 0x2) = 66792 {TCP:7600, IPv4:15} 17591 15:48:06 06.11.2013 16.9594912 192.168.1.142 12.345.678.912 SSL SSL: SSLv3 Rec Layer-1 HandShake: Client Hello. {SSL:7618, SSLVersionSelector:7617, TCP:7600, IPv4:15} 17595 15:48:06 06.11.2013 16.9600483 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56650, PayloadLen=0, Seq=2100721917, Ack=2224213684, Win=0 (scale factor 0x8) = 0 {TCP:7600, IPv4:15} 17628 15:48:06 06.11.2013 16.9818647 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161070988, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7627, IPv4:15} 17629 15:48:06 06.11.2013 16.9822558 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56652, PayloadLen=0, Seq=492713106, Ack=3161070989, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7627, IPv4:15} 17647 15:48:06 06.11.2013 16.9978525 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161070989, Ack=492713107, Win=16698 (scale factor 0x2) = 66792 {TCP:7627, IPv4:15} 17651 15:48:06 06.11.2013 17.0018154 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:7639, SSLVersionSelector:7638, TCP:7627, IPv4:15} 17656 15:48:06 06.11.2013 17.0075517 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done. {TLS:7639, SSLVersionSelector:7638, TCP:7627, IPv4:15} 17673 15:48:06 06.11.2013 17.0286546 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161071154, Ack=492715907, Win=16698 (scale factor 0x2) = 66792 {TCP:7627, IPv4:15} 17674 15:48:06 06.11.2013 17.0291838 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56652, DstPort=HTTPS(443), PayloadLen=0, Seq=3161071154, Ack=492715907, Win=16698 (scale factor 0x2) = 66792 {TCP:7627, IPv4:15} 17675 15:48:06 06.11.2013 17.0292872 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56652, PayloadLen=0, Seq=492715907, Ack=3161071155, Win=0 (scale factor 0x8) = 0 {TCP:7627, IPv4:15} 17676 15:48:06 06.11.2013 17.0314982 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56654, DstPort=HTTPS(443), PayloadLen=0, Seq=2066161233, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7646, IPv4:15} 17677 15:48:06 06.11.2013 17.0318475 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56654, PayloadLen=0, Seq=2002394358, Ack=2066161234, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7646, IPv4:15} 17695 15:48:06 06.11.2013 17.0523515 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56654, DstPort=HTTPS(443), PayloadLen=0, Seq=2066161234, Ack=2002394359, Win=16698 (scale factor 0x2) = 66792 {TCP:7646, IPv4:15} 17699 15:48:06 06.11.2013 17.0538702 192.168.1.142 12.345.678.912 SSL SSL: SSLv3 Rec Layer-1 HandShake: Client Hello. {SSL:7658, SSLVersionSelector:7657, TCP:7646, IPv4:15} 17701 15:48:06 06.11.2013 17.0543947 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56654, PayloadLen=0, Seq=2002394359, Ack=2066161322, Win=0 (scale factor 0x8) = 0 {TCP:7646, IPv4:15} 17751 15:48:06 06.11.2013 17.0796653 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104799, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7683, IPv4:15} 17755 15:48:06 06.11.2013 17.0800380 System 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56656, PayloadLen=0, Seq=475213790, Ack=2607104800, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7683, IPv4:15} 17779 15:48:06 06.11.2013 17.0990831 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104800, Ack=475213791, Win=16698 (scale factor 0x2) = 66792 {TCP:7683, IPv4:15} 17781 15:48:06 06.11.2013 17.1019663 System 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:7696, SSLVersionSelector:7695, TCP:7683, IPv4:15} 17785 15:48:06 06.11.2013 17.1076414 System 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done. {TLS:7696, SSLVersionSelector:7695, TCP:7683, IPv4:15} 17814 15:48:06 06.11.2013 17.1303876 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104965, Ack=475216591, Win=16698 (scale factor 0x2) = 66792 {TCP:7683, IPv4:15} 17815 15:48:06 06.11.2013 17.1311770 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56656, DstPort=HTTPS(443), PayloadLen=0, Seq=2607104965, Ack=475216591, Win=16698 (scale factor 0x2) = 66792 {TCP:7683, IPv4:15} 17816 15:48:06 06.11.2013 17.1312837 System 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56656, PayloadLen=0, Seq=475216591, Ack=2607104966, Win=0 (scale factor 0x8) = 0 {TCP:7683, IPv4:15} 17818 15:48:06 06.11.2013 17.1347276 192.168.1.142 12.345.678.912 TCP TCP:Flags=......S., SrcPort=56658, DstPort=HTTPS(443), PayloadLen=0, Seq=4218009942, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7711, IPv4:15} 17822 15:48:06 06.11.2013 17.1351271 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56658, PayloadLen=0, Seq=920667384, Ack=4218009943, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7711, IPv4:15} 17851 15:48:06 06.11.2013 17.1601925 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56658, DstPort=HTTPS(443), PayloadLen=0, Seq=4218009943, Ack=920667385, Win=16698 (scale factor 0x2) = 66792 {TCP:7711, IPv4:15} 17852 15:48:06 06.11.2013 17.1624127 192.168.1.142 12.345.678.912 SSL SSL: SSLv3 Rec Layer-1 HandShake: Client Hello. {SSL:7727, SSLVersionSelector:7726, TCP:7711, IPv4:15} 17857 15:48:06 06.11.2013 17.1636972 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56658, PayloadLen=0, Seq=920667385, Ack=4218010031, Win=0 (scale factor 0x8) = 0 {TCP:7711, IPv4:15} 20499 15:48:08 06.11.2013 19.3359991 System 192.168.1.142 12.345.678.912 TCP TCP:[SynReTransmit #16776]Flags=......S., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553388, Ack=0, Win=8192 ( Negotiating scale factor 0x2 ) = 8192 {TCP:7284, IPv4:15} 20504 15:48:08 06.11.2013 19.3439314 System 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A..S., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=0, Seq=368478769, Ack=1231553389, Win=8192 ( Negotiated scale factor 0x8 ) = 2097152 {TCP:7284, IPv4:15} 20557 15:48:08 06.11.2013 19.3708879 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553389, Ack=368478770, Win=16698 (scale factor 0x2) = 66792 {TCP:7284, IPv4:15} 20562 15:48:08 06.11.2013 19.3737707 System 192.168.1.142 12.345.678.912 TLS TLS:TLS Rec Layer-1 HandShake: Client Hello. {TLS:8777, SSLVersionSelector:8776, TCP:7284, IPv4:15} 20567 15:48:08 06.11.2013 19.3796078 System 12.345.678.912 192.168.1.142 TLS TLS:TLS Rec Layer-1 HandShake: Server Hello. Certificate. Server Key Exchange. Server Hello Done. {TLS:8777, SSLVersionSelector:8776, TCP:7284, IPv4:15} 20580 15:48:08 06.11.2013 19.4092697 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...., SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553554, Ack=368481570, Win=16698 (scale factor 0x2) = 66792 {TCP:7284, IPv4:15} 20581 15:48:08 06.11.2013 19.4096406 System 192.168.1.142 12.345.678.912 TCP TCP:Flags=...A...F, SrcPort=56638, DstPort=HTTPS(443), PayloadLen=0, Seq=1231553554, Ack=368481570, Win=16698 (scale factor 0x2) = 66792 {TCP:7284, IPv4:15} 20582 15:48:08 06.11.2013 19.4097638 System 12.345.678.912 192.168.1.142 TCP TCP:Flags=...A.R.., SrcPort=HTTPS(443), DstPort=56638, PayloadLen=0, Seq=368481570, Ack=1231553555, Win=0 (scale factor 0x8) = 0 {TCP:7284, IPv4:15}
Kann damit jemand was anfangen?
Ich verstehe nur, das an einer bestimmten Stelle scheinbar ein Reset stattfindet und neu verhandelt wird...
Oder sehe ich das falsch?
- Bearbeitet apfelsine Mittwoch, 6. November 2013 15:59