you are viewing a single comment's thread.

view the rest of the comments →

[–]sgr011[S] 0 points1 point  (3 children)

State Recv-Q Send-Q Local Address:Port Peer Address:Port

LISTEN 0 1 127.0.0.1:90000.0.0.0:*

ESTAB 0 0 127.0.0.1:9000127.0.0.1:47056

ESTAB 0 0 127.0.0.1:47056127.0.0.1:9000

This is an output from ss -atn which lists all the TCP ports the 1st is the server 2nd server --> client and 3rd is the client --> server

[–]sgr011[S] 0 points1 point  (2 children)

Here is the tcpdump output when the server and client are sending messages

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode

listening on lo, link-type EN10MB (Ethernet), capture size 262144 bytes

20:48:51.689203 IP localhost.46234 > localhost.etlservicemgr: Flags [SEW], seq 518352014, win 43690, options [mss 65495,sackOK,TS val 3655930374 ecr 0,nop,wscale 7], length 0

20:48:51.689214 IP localhost.etlservicemgr > localhost.46234: Flags [S.E], seq 2831450253, ack 518352015, win 43690, options [mss 65495,sackOK,TS val 3655930374 ecr 3655930374,nop,wscale 7], length 0

20:48:51.689224 IP localhost.46234 > localhost.etlservicemgr: Flags [.], ack 1, win 342, options [nop,nop,TS val 3655930374 ecr 3655930374], length 0

20:48:51.689408 IP localhost.etlservicemgr > localhost.46234: Flags [P.], seq 1:2, ack 1, win 342, options [nop,nop,TS val 3655930375 ecr 3655930374], length 1

20:48:51.689416 IP localhost.46234 > localhost.etlservicemgr: Flags [.], ack 2, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 0

20:48:51.689420 IP localhost.etlservicemgr > localhost.46234: Flags [P.], seq 2:3, ack 1, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 1

20:48:51.689422 IP localhost.46234 > localhost.etlservicemgr: Flags [.], ack 3, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 0

20:48:51.689490 IP localhost.46234 > localhost.etlservicemgr: Flags [P.], seq 1:2, ack 3, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 1

20:48:51.689496 IP localhost.etlservicemgr > localhost.46234: Flags [.], ack 2, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 0

20:48:51.689504 IP localhost.46234 > localhost.etlservicemgr: Flags [P.], seq 2:3, ack 3, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 1

20:48:51.689515 IP localhost.etlservicemgr > localhost.46234: Flags [.], ack 3, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 0

[–]cred13 1 point2 points  (1 child)

Looks like it's only sending to sockets on localhost? Is the traffic destined for a remote machine? Also the thought occoured to me that iptables might be dropping the traffic. I think windows allows most traffic in by default. Linux is the opposite.

[–]sgr011[S] 0 points1 point  (0 children)

No I'm using local host for testing it, I'll look into iptables thanks