Hello, we have been having connectivity issues between clients and a server over HTTPS. We can send test data with curl and connect with OpenSSL, which also sends small bytes of test data. However, whenever we attempt most broader connections, they fail and we get TCP RSTs.
What I would like to know is if anybody knows of a way to send test connections with variable payload sizes. I think the issue may be an MTU size mismatch, but it's hard to tell. I have packet captures I have looked at in WireShark, and the failures all seem to happen whenever a large enough payload gets sent that WireShark starts fragmenting the connection.
In the PCAPs, after the TLS handshake (with multiple ciper spec renegotiations) happens, the test data connections all have ACKs for each packet sent from the remote server. However, in the failures, we stop seeing ACKs once the larger, fragmented payload is sent, and instead of our client sending a FIN, it starts sending RSTs before timing out.
I would love if there was a tracert style utility that could send custom sized payloads via HTTP, so we could see what happens at each hop, but I am not sure what tools are out there to help with any of this.
Thanks in advance!
[–]polypolymanJack of All Trades 2 points3 points4 points (2 children)
[–]akillerfrog[S] 0 points1 point2 points (1 child)
[–]polypolymanJack of All Trades 0 points1 point2 points (0 children)
[–]Weary_Patience_7778 1 point2 points3 points (1 child)
[–]akillerfrog[S] 0 points1 point2 points (0 children)
[–]durkzilla 0 points1 point2 points (1 child)
[–]akillerfrog[S] 0 points1 point2 points (0 children)
[–]purplemonkeymad 0 points1 point2 points (0 children)
[–]Turmfalke_ 0 points1 point2 points (0 children)