Portál AbcLinuxu, 21. května 2025 12:43
Řešení dotazu:
57 2.626964919 192.168.1.63 192.168.1.132 SSH 166 Server: Encrypted packet (len=100) 58 2.626978814 192.168.1.132 192.168.1.63 TCP 66 41938 → 22 [ACK] Seq=593 Ack=1389 Win=594 Len=0 TSval=1437146603 TSecr=4107948 59 2.866842122 192.168.1.132 192.168.1.63 TCP 102 [TCP Retransmission] 41938 → 22 [PSH, ACK] Seq=557 Ack=1389 Win=594 Len=36 TSval=1437146843 TSecr=4107948 60 2.866910817 192.168.1.63 192.168.1.132 SSH 166 Server: Encrypted packet (len=100) 61 2.866926050 192.168.1.132 192.168.1.63 TCP 66 41938 → 22 [ACK] Seq=593 Ack=1489 Win=594 Len=0 TSval=1437146843 TSecr=4107960občas se objevuje i
663 41.487835530 192.168.1.132 192.168.1.63 SSH 102 Client: Encrypted packet (len=36) 664 41.774552796 192.168.1.63 192.168.1.132 SSH 166 Server: Encrypted packet (len=100) 665 41.774576585 192.168.1.132 192.168.1.63 TCP 66 41938 → 22 [ACK] Seq=5777 Ack=15493 Win=594 Len=0 TSval=1438203422 TSecr=4372102 666 41.774585533 192.168.1.63 192.168.1.132 SSH 166 Server: [TCP Spurious Retransmission] , Encrypted packet (len=100) 667 41.774588453 192.168.1.132 192.168.1.63 TCP 78 [TCP Dup ACK 665#1] 41938 → 22 [ACK] Seq=5777 Ack=15493 Win=594 Len=0 TSval=1438203422 TSecr=4372174 SLE=15393 SRE=15493na vzdáleném serveru jsou vidět dropped v ifconfig na lokále žádné problémy
Tiskni
Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.