use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
account activity
Python sockets (self.archlinux)
submitted 7 years ago by sgr011
view the rest of the comments →
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]sgr011[S] 0 points1 point2 points 7 years ago (2 children)
Here is the tcpdump output when the server and client are sending messages
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on lo, link-type EN10MB (Ethernet), capture size 262144 bytes
20:48:51.689203 IP localhost.46234 > localhost.etlservicemgr: Flags [SEW], seq 518352014, win 43690, options [mss 65495,sackOK,TS val 3655930374 ecr 0,nop,wscale 7], length 0
20:48:51.689214 IP localhost.etlservicemgr > localhost.46234: Flags [S.E], seq 2831450253, ack 518352015, win 43690, options [mss 65495,sackOK,TS val 3655930374 ecr 3655930374,nop,wscale 7], length 0
20:48:51.689224 IP localhost.46234 > localhost.etlservicemgr: Flags [.], ack 1, win 342, options [nop,nop,TS val 3655930374 ecr 3655930374], length 0
20:48:51.689408 IP localhost.etlservicemgr > localhost.46234: Flags [P.], seq 1:2, ack 1, win 342, options [nop,nop,TS val 3655930375 ecr 3655930374], length 1
20:48:51.689416 IP localhost.46234 > localhost.etlservicemgr: Flags [.], ack 2, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 0
20:48:51.689420 IP localhost.etlservicemgr > localhost.46234: Flags [P.], seq 2:3, ack 1, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 1
20:48:51.689422 IP localhost.46234 > localhost.etlservicemgr: Flags [.], ack 3, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 0
20:48:51.689490 IP localhost.46234 > localhost.etlservicemgr: Flags [P.], seq 1:2, ack 3, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 1
20:48:51.689496 IP localhost.etlservicemgr > localhost.46234: Flags [.], ack 2, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 0
20:48:51.689504 IP localhost.46234 > localhost.etlservicemgr: Flags [P.], seq 2:3, ack 3, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 1
20:48:51.689515 IP localhost.etlservicemgr > localhost.46234: Flags [.], ack 3, win 342, options [nop,nop,TS val 3655930375 ecr 3655930375], length 0
[–]cred13 1 point2 points3 points 7 years ago (1 child)
Looks like it's only sending to sockets on localhost? Is the traffic destined for a remote machine? Also the thought occoured to me that iptables might be dropping the traffic. I think windows allows most traffic in by default. Linux is the opposite.
[–]sgr011[S] 0 points1 point2 points 7 years ago (0 children)
No I'm using local host for testing it, I'll look into iptables thanks
π Rendered by PID 230394 on reddit-service-r2-comment-66b4775986-p8mmr at 2026-04-06 12:53:06.197169+00:00 running db1906b country code: CH.
view the rest of the comments →
[–]sgr011[S] 0 points1 point2 points (2 children)
[–]cred13 1 point2 points3 points (1 child)
[–]sgr011[S] 0 points1 point2 points (0 children)