No. Time Source Destination Protocol Length Info
23 1.520649 192.168.1.147 27.16.XX TCP 66 64858 → 10445 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM
24 1.533934 27.16.XX 192.168.1.147 TCP 66 10445 → 64858 [SYN, ACK] Seq=0 Ack=1 Win=32120 Len=0 MSS=1452 SACK_PERM WS=128
25 1.534033 192.168.1.147 27.16.XX TCP 54 64858 → 10445 [ACK] Seq=1 Ack=1 Win=132096 Len=0
26 1.534275 192.168.1.147 27.16.XX TLSv1 315 Client Hello (SNI=XX.free.hr)
27 1.541790 27.16.XX 192.168.1.147 TCP 60 10445 → 64858 [RST, ACK] Seq=1 Ack=262 Win=66048 Len=0
28 1.541790 27.16.XX 192.168.1.147 TCP 60 10445 → 64858 [RST] Seq=1 Win=66048 Len=0
29 1.547338 27.16.XX 192.168.1.147 TCP 60 [TCP Window Update] 10445 → 64858 [ACK] Seq=1 Ack=262 Win=31872 Len=0
30 1.547363 192.168.1.147 27.16.XX TCP 54 64858 → 10445 [RST] Seq=262 Win=0 Len=0
No. Time Source Destination Protocol Length Info
353 13.187083 117.154.XX 192.168.31.2 TCP 66 11250 → 33443 [SYN] Seq=0 Win=64240 Len=0 MSS=1452 WS=256 SACK_PERM
354 13.187329 192.168.31.2 117.154.XX TCP 66 33443 → 11250 [SYN, ACK] Seq=0 Ack=1 Win=32120 Len=0 MSS=1460 SACK_PERM WS=128
355 13.198110 117.154.XX 192.168.31.2 TCP 60 11250 → 33443 [ACK] Seq=1 Ack=1 Win=132096 Len=0
356 13.198594 117.154.XX 192.168.31.2 TLSv1 315 Client Hello (SNI=XX.free.hr)
357 13.198733 192.168.31.2 117.154.XX TCP 54 33443 → 11250 [ACK] Seq=1 Ack=262 Win=31872 Len=0
358 13.200749 117.154.XX 192.168.31.2 TCP 60 11250 → 33443 [RST, ACK] Seq=1 Ack=1 Win=132096 Len=0
359 13.200749 117.154.XX 192.168.31.2 TCP 60 11250 → 33443 [RST] Seq=262 Win=132096 Len=0
No. Time Source Destination Protocol Length Info
943 5.009217 192.168.236.64 27.16.XX TCP 66 51705 → 10445 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM
960 5.031696 27.16.XX 192.168.236.64 TCP 66 10445 → 51705 [SYN, ACK] Seq=0 Ack=1 Win=32120 Len=0 MSS=1360 SACK_PERM WS=128
961 5.032256 192.168.236.64 27.16.XX TCP 54 51705 → 10445 [ACK] Seq=1 Ack=1 Win=131840 Len=0
962 5.033771 192.168.236.64 27.16.XX TLSv1.3 315 Client Hello (SNI=XX.free.hr)
969 5.058078 27.16.XX 192.168.236.64 TCP 54 10445 → 51705 [ACK] Seq=1 Ack=262 Win=31872 Len=0
970 5.060818 27.16.XX 192.168.236.64 TLSv1.3 2774 Server Hello, Change Cipher Spec, Application Data, Application Data, Application Data
971 5.060818 27.16.XX 192.168.236.64 TLSv1.3 80 Application Data
972 5.060891 192.168.236.64 27.16.XX TCP 54 51705 → 10445 [ACK] Seq=262 Ack=2747 Win=131840 Len=0
973 5.061203 192.168.236.64 27.16.XX TLSv1.3 118 Change Cipher Spec, Application Data
No. Time Source Destination Protocol Length Info
2288 15.006871 192.168.1.147 27.16.XX TCP 66 60082 → 10444 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM
2290 15.018397 27.16.XX 192.168.1.147 TCP 66 10444 → 60082 [SYN, ACK] Seq=0 Ack=1 Win=32120 Len=0 MSS=1452 SACK_PERM WS=128
2291 15.018469 192.168.1.147 27.16.XX TCP 54 60082 → 10444 [ACK] Seq=1 Ack=1 Win=132096 Len=0
2292 15.018671 192.168.1.147 27.16.XX TLSv1.2 1879 Client Hello (SNI=XX.free.hr)
2297 15.027778 27.16.XX 192.168.1.147 TCP 66 [TCP Window Update] 10444 → 60082 [ACK] Seq=1 Ack=1 Win=32128 Len=0 SLE=1453 SRE=1826
2299 15.027778 27.16.XX 192.168.1.147 TCP 60 10444 → 60082 [ACK] Seq=1 Ack=1826 Win=31872 Len=0
No. Time Source Destination Protocol Length Info
9448 66.855063 192.168.1.147 27.16.XX TCP 66 56190 → 10444 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM
9449 66.867467 27.16.XX 192.168.1.147 TCP 66 10444 → 56190 [SYN, ACK] Seq=0 Ack=1 Win=32120 Len=0 MSS=1452 SACK_PERM WS=128
9450 66.867543 192.168.1.147 27.16.XX TCP 54 56190 → 10444 [ACK] Seq=1 Ack=1 Win=132096 Len=0
9575 67.787635 192.168.1.147 27.16.XX TLSv1 571 Client Hello (SNI=XX.free.hr)
9576 67.793835 27.16.XX 192.168.1.147 TCP 60 10444 → 56190 [RST, ACK] Seq=1 Ack=518 Win=66048 Len=0
9577 67.793835 27.16.XX 192.168.1.147 TCP 60 10444 → 56190 [RST] Seq=1 Win=66048 Len=0
No. Time Source Destination Protocol Length Info
3670 26.811577 192.168.1.147 27.16.XX TCP 66 53655 → 10444 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM
3679 26.829037 27.16.XX 192.168.1.147 TCP 66 10444 → 53655 [SYN, ACK] Seq=0 Ack=1 Win=32120 Len=0 MSS=1452 SACK_PERM WS=128
3680 26.829159 192.168.1.147 27.16.XX TCP 54 53655 → 10444 [ACK] Seq=1 Ack=1 Win=132096 Len=0
4206 30.534391 192.168.1.147 27.16.XX TLSv1.2 571 Client Hello (SNI=baidu.com)
4207 30.546027 27.16.XX 192.168.1.147 TCP 60 10444 → 53655 [ACK] Seq=1 Ack=518 Win=31872 Len=0
中国移动在对中国电信发送 TLS 请求时,会根据 SNI 判断是否发送 RST 强行关闭 TCP 连接。
这是一个专为移动设备优化的页面(即为了让你能够在 Google 搜索结果里秒开这个页面),如果你希望参与 V2EX 社区的讨论,你可以继续到 V2EX 上打开本讨论主题的完整版本。
V2EX 是创意工作者们的社区,是一个分享自己正在做的有趣事物、交流想法,可以遇见新朋友甚至新机会的地方。
V2EX is a community of developers, designers and creative people.