Menu

Problème de port forwarding entre deux routeurs (double NAT) [Résolu]

Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
- - Dernière réponse : 0917725929
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
- 28 avril 2019 à 15:55
Bonjour,

J'ai besoin d'avoir ma console Xbox 360 accessible sur le port 3074 pour avoir un NAT ouvert.
Problème, j'ai une connexion 4G qui fait que je ne suis pas directement connecté au net, il y a un LAN privé Free entre mon tel et l'antenne 4G et biensûr je ne peux pas intervenir sur leur routeur pour ouvrir mes ports.

Pour outrepasser cet inconvénient, j'ai pris un VPS Debian 8 chez OVH sur lequel j'ai installé une passerelle OpenVPN. Ensuite, je connecte mon tel au serveur VPN (tun0), puis j'active le tethering WiFi (wlan0). Une appli qui va bien (VPN Tether) me permet de router la connexion VPN à travers mon LAN, dérière lequel il y a, entre autre, ma fameuse Xbox.

Dans ces conditions, sur le VPS je n'ai qu'à ouvrir le port 3074 et le forwarder vers l'IP du téléphone (10.8.0.6:3074), puis sur le téléphone, toujours avec une appli qui va bien, je forwarde de nouveau le port 3074 vers l'IP LAN de la console (192.168.43.201:3074). En théorie me voilà donc avec un NAT ouvert.

Sauf qu'en pratique ça ne fonctionne pas : quand je fait la manip, le port s'ouvre bien (d'après https://www.yougetsignal.com/tools/open-ports/) mais la xbox le voit fermé.

Pour savoir si ça vient du serveur qui ne forwarderait pas vers le tel, ou le tel qui ne forwarderait pas vers la xbox, j'ai installé un serveur FTP sur le tel (10.8.0.6:2221).

Quand je me mets en SSH sur le VPS je peux me connecter au FTP via 10.8.0.6:2221, mais quand j'essaye depuis un appareil qui n'est pas dans le réseau de me connecter sur IP_PUBLIC_VPS:2221 ça ne marche pas, je ne comprends pas pourquoi ...

Merci d'avance pour vos suggestions :)

Ressources :

Voir schéma réseau en bas de post

Résultat de iptables -S sur le VPS (j'ai changer l'IP publique):

-P INPUT ACCEPT
-P FORWARD ACCEPT
-P OUTPUT ACCEPT
-N f2b-nginx-auth
-N f2b-nginx-badbots
-N f2b-ssh
-N f2b-sshd
-N f2b-vsftpd
-A INPUT -p tcp -m multiport --dports 80,443 -j f2b-nginx-badbots
-A INPUT -p tcp -m multiport --dports 80,443 -j f2b-nginx-auth
-A INPUT -p tcp -m multiport --dports 22 -j f2b-ssh
-A INPUT -p tcp -m multiport --dports 21,20,990,989 -j f2b-vsftpd
-A INPUT -p tcp -m multiport --dports 22 -j f2b-sshd
-A INPUT -p udp -m udp --dport 1194 -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -i tun0 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 2221 -j ACCEPT
-A FORWARD -s 10.8.0.0/24 -j ACCEPT
-A FORWARD -i ens3 -o tun0 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p tcp -m tcp --dport 3074 -m state --state NEW,RELATE D,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 3074 -m state --state NEW,RELATE D,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 88 -m state --state NEW,RELATED, ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 53 -m state --state NEW,RELATED, ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p tcp -m tcp --dport 53 -m state --state NEW,RELATED, ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 500 -m state --state NEW,RELATED ,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 3544 -m state --state NEW,RELATE D,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 4500 -m state --state NEW,RELATE D,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 6672 -m state --state NEW,RELATE D,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 61455 -m state --state NEW,RELAT ED,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 61456 -m state --state NEW,RELAT ED,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 61457 -m state --state NEW,RELAT ED,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 61458 -m state --state NEW,RELAT ED,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p tcp -m tcp --dport 2221 -m state --state NEW,RELATE D,ESTABLISHED -j ACCEPT
-A FORWARD -d 10.8.0.6/32 -p udp -m udp --dport 2221 -m state --state NEW,RELATE D,ESTABLISHED -j ACCEPT
-A FORWARD -d XX.XX.XX.XX/32 -p tcp -m tcp --dport 2221 -m state --state NEW,REL ATED,ESTABLISHED -j ACCEPT
-A OUTPUT -o tun0 -j ACCEPT
-A f2b-nginx-auth -j RETURN
-A f2b-nginx-badbots -j RETURN
-A f2b-ssh -s 51.255.194.249/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-ssh -s 103.30.94.210/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-ssh -s 157.230.41.31/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-ssh -s 80.211.69.250/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-ssh -s 116.68.127.9/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-ssh -s 217.61.97.168/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-ssh -s 104.236.93.172/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-ssh -s 51.255.160.188/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-ssh -j RETURN
-A f2b-sshd -s 51.255.194.249/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 103.30.94.210/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 157.230.41.31/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 80.211.69.250/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 116.68.127.9/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 217.61.97.168/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 104.236.93.172/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -s 51.255.160.188/32 -j REJECT --reject-with icmp-port-unreachable
-A f2b-sshd -j RETURN
-A f2b-vsftpd -j RETURN



Résultat de iptables -L -n -v sur le VPS
1:~# iptables -L -v -n
Chain INPUT (policy ACCEPT 23 packets, 936 bytes)
pkts bytes target prot opt in out source destination
5991 3383K f2b-nginx-badbots tcp -- * * 0.0.0.0/0 0.0. 0.0/0 multiport dports 80,443
6018 3384K f2b-nginx-auth tcp -- * * 0.0.0.0/0 0.0.0.0 /0 multiport dports 80,443
11214 1203K f2b-ssh tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 22
55 3053 f2b-vsftpd tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 21,20,990,989
10487 1154K f2b-sshd tcp -- * * 0.0.0.0/0 0.0.0.0/0 multiport dports 22
3506 753K ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1194
109K 17M ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
1323 80372 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
5 300 ACCEPT all -- tun0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:2221

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
2521 241K ACCEPT all -- * * 10.8.0.0/24 0.0.0.0/0
5806 6660K ACCEPT all -- ens3 tun0 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 10.8.0.6 tcp dpt:3074 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:3074 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:88 state NEW,RELATED,ESTABLISHED
3 174 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:53 state NEW,RELATED,ESTABLISHED
116 5092 ACCEPT tcp -- * * 0.0.0.0/0 10.8.0.6 tcp dpt:53 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:500 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:3544 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:4500 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:6672 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:61455 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:61456 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:61457 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:61458 state NEW,RELATED,ESTABLISHED
12 688 ACCEPT tcp -- * * 0.0.0.0/0 10.8.0.6 tcp dpt:2221 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0 10.8.0.6 udp dpt:2221 state NEW,RELATED,ESTABLISHED
0 0 ACCEPT tcp -- * * 0.0.0.0/0 51.38.70.80 tcp dpt:2221 state NEW,RELATED,ESTABLISHED

Chain OUTPUT (policy ACCEPT 59 packets, 7349 bytes)
pkts bytes target prot opt in out source destination
109 6220 ACCEPT all -- * tun0 0.0.0.0/0 0.0.0.0/0

Chain f2b-nginx-auth (1 references)
pkts bytes target prot opt in out source destination
6018 3384K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0

Chain f2b-nginx-badbots (1 references)
pkts bytes target prot opt in out source destination
5991 3383K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0

Chain f2b-ssh (1 references)
pkts bytes target prot opt in out source destination
0 0 REJECT all -- * * 13.80.42.98 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT all -- * * 106.75.10.4 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT all -- * * 34.73.60.150 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT all -- * * 51.75.143.169 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT all -- * * 206.189.229.112 0.0.0.0/0 reject-with icmp-port-unreachable
44 3384 REJECT all -- * * 202.131.237.182 0.0.0.0/0 reject-with icmp-port-unreachable
10487 1154K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0

Chain f2b-sshd (1 references)
pkts bytes target prot opt in out source destination
0 0 REJECT all -- * * 13.80.42.98 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT all -- * * 106.75.10.4 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT all -- * * 34.73.60.150 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT all -- * * 51.75.143.169 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT all -- * * 206.189.229.112 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 REJECT all -- * * 202.131.237.182 0.0.0.0/0 reject-with icmp-port-unreachable
10478 1153K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0

Chain f2b-vsftpd (1 references)
pkts bytes target prot opt in out source destination
55 3053 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0



Résultat de iptables -L -n -v -t nat sur le VPS
1:~# iptables -L -v -n -t nat
Chain PREROUTING (policy ACCEPT 12344 packets, 514K bytes)
pkts bytes target prot opt in out source destination
0 0 DNAT tcp -- ens3 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3074 to:10.8.0.6:3074
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:3074 to:10.8.0.6:3074
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:88 to:10.8.0.6:88
3 174 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:53 to:10.8.0.6:53
50 2188 DNAT tcp -- ens3 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:53 to:10.8.0.6:53
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:500 to:10.8.0.6:500
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:3544 to:10.8.0.6:3544
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:4500 to:10.8.0.6:4500
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:6672 to:10.8.0.6:6672
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:61455 to:10.8.0.6:61455
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:61456 to:10.8.0.6:61456
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:61457 to:10.8.0.6:61457
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:61458 to:10.8.0.6:61458
9 508 DNAT tcp -- ens3 * 0.0.0.0/0 0.0.0.0/0 tcp dpt:2221 to:10.8.0.6:2221
0 0 DNAT udp -- ens3 * 0.0.0.0/0 0.0.0.0/0 udp dpt:2221 to:10.8.0.6:2221

Chain INPUT (policy ACCEPT 11461 packets, 459K bytes)
pkts bytes target prot opt in out source destination

Chain OUTPUT (policy ACCEPT 4975 packets, 315K bytes)
pkts bytes target prot opt in out source destination

Chain POSTROUTING (policy ACCEPT 5026 packets, 317K bytes)
pkts bytes target prot opt in out source destination
444 29993 MASQUERADE all -- * ens3 10.8.0.0/24 0.0.0.0/0
0 0 SNAT tcp -- * ens3 0.0.0.0/0 0.0.0.0/0 tcp dpt:2221 to:51.38.70.80:2221
[/QUOTE]


iptables -S sur le Tél.:
-P INPUT ACCEPT
-P FORWARD ACCEPT
-P OUTPUT ACCEPT
-N block_all_dns
-N block_black_table
-N block_white_table
-N bw_FORWARD
-N bw_INPUT
-N bw_OUTPUT
-N bw_VIDEOCALL_IN
-N bw_VIDEOCALL_OUT
-N bw_costly_rmnet0
-N bw_costly_shared
-N bw_data_saver
-N bw_happy_box
-N bw_penalty_box
-N bw_roaming_reduction
-N bw_videocall_box
-N fw_FORWARD
-N fw_INPUT
-N fw_OUTPUT
-N fw_dozable
-N fw_powersave
-N fw_standby
-N fw_standby_uid
-N knox_vpn_filter_input_drop
-N knox_vpn_filter_input_exempt
-N knox_vpn_filter_output_act
-N knox_vpn_filter_output_drop
-N natctrl_FORWARD
-N natctrl_tether_counters
-N oem_fwd
-N oem_out
-N st_OUTPUT
-N st_clear_caught
-N st_clear_detect
-N st_penalty_log
-N st_penalty_reject
-A INPUT -j knox_vpn_filter_input_exempt
-A INPUT -j knox_vpn_filter_input_drop
-A INPUT -j bw_INPUT
-A INPUT -j fw_INPUT
-A INPUT -j bw_VIDEOCALL_IN
-A FORWARD -j ACCEPT
-A FORWARD -j oem_fwd
-A FORWARD -j fw_FORWARD
-A FORWARD -j bw_FORWARD
-A FORWARD -j natctrl_FORWARD
-A OUTPUT -j knox_vpn_filter_output_act
-A OUTPUT -j knox_vpn_filter_output_drop
-A OUTPUT -j oem_out
-A OUTPUT -j fw_OUTPUT
-A OUTPUT -j st_OUTPUT
-A OUTPUT -j bw_OUTPUT
-A OUTPUT -j bw_VIDEOCALL_OUT
-A bw_FORWARD -m quota2 ! --name globalAlert --quota 52428800
-A bw_INPUT -m quota2 ! --name globalAlert --quota 2097152
-A bw_INPUT -i rmnet0 -j bw_costly_rmnet0
-A bw_INPUT -m owner --socket-exists
-A bw_OUTPUT -m quota2 ! --name globalAlert --quota 2097152
-A bw_OUTPUT -o rmnet0 -j bw_costly_rmnet0
-A bw_OUTPUT -m owner --socket-exists
-A bw_costly_rmnet0 -j bw_penalty_box
-A bw_costly_rmnet0 -j bw_roaming_reduction
-A bw_costly_rmnet0 -m quota2 ! --name rmnet0 --quota 9223372036854775807 -j REJECT --reject-with icmp-port-unreachable
-A bw_costly_shared -j bw_penalty_box
-A bw_data_saver -j RETURN
-A bw_happy_box -m owner --uid-owner 10032 -j RETURN
-A bw_happy_box -m owner --uid-owner 10046 -j RETURN
-A bw_happy_box -m owner --uid-owner 10034 -j RETURN
-A bw_happy_box -m owner --uid-owner 10020 -j RETURN
-A bw_happy_box -m owner --uid-owner 0-9999 -j RETURN
-A bw_happy_box -j bw_data_saver
-A bw_penalty_box -j bw_happy_box
-A fw_INPUT -j fw_standby
-A fw_OUTPUT -j fw_standby
-A fw_dozable -m owner --uid-owner 10199 -j RETURN
-A fw_dozable -m owner --uid-owner 1000 -j RETURN
-A fw_dozable -m owner --uid-owner 1001 -j RETURN
-A fw_dozable -m owner --uid-owner 1027 -j RETURN
-A fw_dozable -m owner --uid-owner 5002 -j RETURN
-A fw_dozable -m owner --uid-owner 10006 -j RETURN
-A fw_dozable -m owner --uid-owner 10015 -j RETURN
-A fw_dozable -m owner --uid-owner 10020 -j RETURN
-A fw_dozable -m owner --uid-owner 10021 -j RETURN
-A fw_dozable -m owner --uid-owner 10032 -j RETURN
-A fw_dozable -m owner --uid-owner 10034 -j RETURN
-A fw_dozable -m owner --uid-owner 10041 -j RETURN
-A fw_dozable -m owner --uid-owner 10046 -j RETURN
-A fw_dozable -m owner --uid-owner 10059 -j RETURN
-A fw_dozable -m owner --uid-owner 10072 -j RETURN
-A fw_dozable -m owner --uid-owner 10075 -j RETURN
-A fw_dozable -m owner --uid-owner 10076 -j RETURN
-A fw_dozable -m owner --uid-owner 10096 -j RETURN
-A fw_dozable -m owner --uid-owner 10138 -j RETURN
-A fw_dozable -m owner --uid-owner 10141 -j RETURN
-A fw_dozable -m owner --uid-owner 10142 -j RETURN
-A fw_dozable -m owner --uid-owner 10154 -j RETURN
-A fw_dozable -i lo -j RETURN
-A fw_dozable -o lo -j RETURN
-A fw_dozable -p tcp -m tcp --tcp-flags RST RST -j RETURN
-A fw_dozable -p esp -j RETURN
-A fw_dozable -p tcp -m tcp --sport 5060 -j RETURN
-A fw_dozable -p tcp -m tcp --dport 5060 -j RETURN
-A fw_dozable -m owner --uid-owner 0-9999 -j RETURN
-A fw_dozable -j DROP
-A fw_powersave -i lo -j RETURN
-A fw_powersave -o lo -j RETURN
-A fw_powersave -p tcp -m tcp --tcp-flags RST RST -j RETURN
-A fw_powersave -p esp -j RETURN
-A fw_powersave -p tcp -m tcp --sport 5060 -j RETURN
-A fw_powersave -p tcp -m tcp --dport 5060 -j RETURN
-A fw_powersave -m owner --uid-owner 0-9999 -j RETURN
-A fw_powersave -j DROP
-A fw_standby -i lo -j RETURN
-A fw_standby -o lo -j RETURN
-A fw_standby -p tcp -m tcp --tcp-flags RST RST -j RETURN
-A fw_standby -j fw_standby_uid
-A fw_standby_uid -i lo -j RETURN
-A fw_standby_uid -o lo -j RETURN
-A fw_standby_uid -p tcp -m tcp --tcp-flags RST RST -j RETURN
-A fw_standby_uid -m owner --uid-owner 10202 -j DROP
-A fw_standby_uid -m owner --uid-owner 10201 -j DROP
-A fw_standby_uid -m owner --uid-owner 10200 -j DROP
-A fw_standby_uid -m owner --uid-owner 10198 -j DROP
-A fw_standby_uid -m owner --uid-owner 10197 -j DROP
-A fw_standby_uid -m owner --uid-owner 10196 -j DROP
-A fw_standby_uid -m owner --uid-owner 10195 -j DROP
-A fw_standby_uid -m owner --uid-owner 10192 -j DROP
-A fw_standby_uid -m owner --uid-owner 10191 -j DROP
-A fw_standby_uid -m owner --uid-owner 10188 -j DROP
-A fw_standby_uid -m owner --uid-owner 10187 -j DROP
-A fw_standby_uid -m owner --uid-owner 10184 -j DROP
-A fw_standby_uid -m owner --uid-owner 10183 -j DROP
-A fw_standby_uid -m owner --uid-owner 10182 -j DROP
-A fw_standby_uid -m owner --uid-owner 10179 -j DROP
-A fw_standby_uid -m owner --uid-owner 10178 -j DROP
-A fw_standby_uid -m owner --uid-owner 10177 -j DROP
-A fw_standby_uid -m owner --uid-owner 10175 -j DROP
-A fw_standby_uid -m owner --uid-owner 10173 -j DROP
-A fw_standby_uid -m owner --uid-owner 10172 -j DROP
-A fw_standby_uid -m owner --uid-owner 10167 -j DROP
-A fw_standby_uid -m owner --uid-owner 10161 -j DROP
-A fw_standby_uid -m owner --uid-owner 10160 -j DROP
-A fw_standby_uid -m owner --uid-owner 10159 -j DROP
-A fw_standby_uid -m owner --uid-owner 10158 -j DROP
-A fw_standby_uid -m owner --uid-owner 10157 -j DROP
-A fw_standby_uid -m owner --uid-owner 10155 -j DROP
-A fw_standby_uid -m owner --uid-owner 10152 -j DROP
-A fw_standby_uid -m owner --uid-owner 10145 -j DROP
-A fw_standby_uid -m owner --uid-owner 10144 -j DROP
-A fw_standby_uid -m owner --uid-owner 10132 -j DROP
-A fw_standby_uid -m owner --uid-owner 10124 -j DROP
-A fw_standby_uid -m owner --uid-owner 10121 -j DROP
-A fw_standby_uid -m owner --uid-owner 10118 -j DROP
-A fw_standby_uid -m owner --uid-owner 10113 -j DROP
-A fw_standby_uid -m owner --uid-owner 10109 -j DROP
-A fw_standby_uid -m owner --uid-owner 10106 -j DROP
-A fw_standby_uid -m owner --uid-owner 10105 -j DROP
-A fw_standby_uid -m owner --uid-owner 10102 -j DROP
-A fw_standby_uid -m owner --uid-owner 10099 -j DROP
-A fw_standby_uid -m owner --uid-owner 10093 -j DROP
-A fw_standby_uid -m owner --uid-owner 10086 -j DROP
-A fw_standby_uid -m owner --uid-owner 10081 -j DROP
-A fw_standby_uid -m owner --uid-owner 10080 -j DROP
-A fw_standby_uid -m owner --uid-owner 10073 -j DROP
-A fw_standby_uid -m owner --uid-owner 10069 -j DROP
-A fw_standby_uid -m owner --uid-owner 10062 -j DROP
-A fw_standby_uid -m owner --uid-owner 10061 -j DROP
-A fw_standby_uid -m owner --uid-owner 10050 -j DROP
-A fw_standby_uid -m owner --uid-owner 10048 -j DROP
-A fw_standby_uid -m owner --uid-owner 10043 -j DROP
-A fw_standby_uid -m owner --uid-owner 10040 -j DROP
-A fw_standby_uid -m owner --uid-owner 10039 -j DROP
-A fw_standby_uid -m owner --uid-owner 10037 -j DROP
-A fw_standby_uid -m owner --uid-owner 10030 -j DROP
-A fw_standby_uid -m owner --uid-owner 10024 -j DROP
-A fw_standby_uid -m owner --uid-owner 10022 -j DROP
-A fw_standby_uid -m owner --uid-owner 10018 -j DROP
-A fw_standby_uid -m owner --uid-owner 10014 -j DROP
-A fw_standby_uid -m owner --uid-owner 10011 -j DROP
-A fw_standby_uid -m owner --uid-owner 10137 -j DROP
-A fw_standby_uid -m owner --uid-owner 10164 -j DROP
-A fw_standby_uid -m owner --uid-owner 10143 -j DROP
-A fw_standby_uid -m owner --uid-owner 10033 -j DROP
-A fw_standby_uid -m owner --uid-owner 10005 -j DROP
-A fw_standby_uid -m owner --uid-owner 10095 -j DROP
-A fw_standby_uid -m owner --uid-owner 10058 -j DROP
-A fw_standby_uid -m owner --uid-owner 10049 -j DROP
-A fw_standby_uid -m owner --uid-owner 10044 -j DROP
-A fw_standby_uid -m owner --uid-owner 10035 -j DROP
-A fw_standby_uid -m owner --uid-owner 10055 -j DROP
-A fw_standby_uid -m owner --uid-owner 10189 -j DROP
-A fw_standby_uid -m owner --uid-owner 10194 -j DROP
-A fw_standby_uid -m owner --uid-owner 10166 -j DROP
-A fw_standby_uid -m owner --uid-owner 10185 -j DROP
-A fw_standby_uid -m owner --uid-owner 10135 -j DROP
-A fw_standby_uid -m owner --uid-owner 10065 -j DROP
-A fw_standby_uid -m owner --uid-owner 10190 -j DROP
-A fw_standby_uid -m owner --uid-owner 10171 -j DROP
-A fw_standby_uid -m owner --uid-owner 10088 -j DROP
-A fw_standby_uid -m owner --uid-owner 10123 -j DROP
-A fw_standby_uid -m owner --uid-owner 10122 -j DROP
-A fw_standby_uid -m owner --uid-owner 10052 -j DROP
-A fw_standby_uid -m owner --uid-owner 10047 -j DROP
-A fw_standby_uid -m owner --uid-owner 10174 -j DROP
-A fw_standby_uid -m owner --uid-owner 10186 -j DROP
-A fw_standby_uid -m owner --uid-owner 10054 -j DROP
-A fw_standby_uid -m owner --uid-owner 10097 -j DROP
-A fw_standby_uid -m owner --uid-owner 10009 -j DROP
-A fw_standby_uid -m owner --uid-owner 10163 -j DROP
-A natctrl_FORWARD -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
-A natctrl_FORWARD -i rmnet0 -o wlan0 -m state --state RELATED,ESTABLISHED -g natctrl_tether_counters
-A natctrl_FORWARD -i wlan0 -o rmnet0 -m state --state INVALID -j DROP
-A natctrl_FORWARD -i wlan0 -o rmnet0 -g natctrl_tether_counters
-A natctrl_FORWARD -j DROP
-A natctrl_tether_counters -i wlan0 -o rmnet0 -j RETURN
-A natctrl_tether_counters -i rmnet0 -o wlan0 -j RETURN
-A st_clear_detect -m connmark --mark 0x2000000/0x2000000 -j REJECT --reject-with icmp-port-unreachable
-A st_clear_detect -m connmark --mark 0x1000000/0x1000000 -j RETURN
-A st_clear_detect -p tcp -m u32 --u32 "0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x0&0xffff0000=0x16030000&&0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x4&0xff0000=0x10000" -j CONNMARK --set-xmark 0x1000000/0x1000000
-A st_clear_detect -p udp -m u32 --u32 "0x0>>0x16&0x3c@0x8&0xffff0000=0x16fe0000&&0x0>>0x16&0x3c@0x14&0xff0000=0x10000" -j CONNMARK --set-xmark 0x1000000/0x1000000
-A st_clear_detect -m connmark --mark 0x1000000/0x1000000 -j RETURN
-A st_clear_detect -p tcp -m state --state ESTABLISHED -m u32 --u32 "0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x0&0x0=0x0" -j st_clear_caught
-A st_clear_detect -p udp -j st_clear_caught
-A st_penalty_log -j CONNMARK --set-xmark 0x1000000/0x1000000
-A st_penalty_log -j NFLOG
-A st_penalty_reject -j CONNMARK --set-xmark 0x2000000/0x2000000
-A st_penalty_reject -j NFLOG
-A st_penalty_reject -j REJECT --reject-with icmp-port-unreachable



iptables -L -v -n sur le tél:
Chain INPUT (policy ACCEPT 305 packets, 71595 bytes)
pkts bytes target prot opt in out source destination
17319 8255K knox_vpn_filter_input_exempt all -- * * 0.0.0.0/0 0.0.0.0/0
17319 8255K knox_vpn_filter_input_drop all -- * * 0.0.0.0/0 0.0.0.0/0
17319 8255K bw_INPUT all -- * * 0.0.0.0/0 0.0.0.0/0
17319 8255K fw_INPUT all -- * * 0.0.0.0/0 0.0.0.0/0
16912 8223K bw_VIDEOCALL_IN all -- * * 0.0.0.0/0 0.0.0.0/0

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
138 30302 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0
121K 64M oem_fwd all -- * * 0.0.0.0/0 0.0.0.0/0
121K 64M fw_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0
121K 64M bw_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0
121K 64M natctrl_FORWARD all -- * * 0.0.0.0/0 0.0.0.0/0

Chain OUTPUT (policy ACCEPT 362 packets, 55331 bytes)
pkts bytes target prot opt in out source destination
20704 4008K knox_vpn_filter_output_act all -- * * 0.0.0.0/0 0.0.0.0/0
20704 4008K knox_vpn_filter_output_drop all -- * * 0.0.0.0/0 0.0.0.0/0
20704 4008K oem_out all -- * * 0.0.0.0/0 0.0.0.0/0
20704 4008K fw_OUTPUT all -- * * 0.0.0.0/0 0.0.0.0/0
19305 3917K st_OUTPUT all -- * * 0.0.0.0/0 0.0.0.0/0
19305 3917K bw_OUTPUT all -- * * 0.0.0.0/0 0.0.0.0/0
19305 3917K bw_VIDEOCALL_OUT all -- * * 0.0.0.0/0 0.0.0.0/0

Chain block_all_dns (0 references)
pkts bytes target prot opt in out source destination

Chain block_black_table (0 references)
pkts bytes target prot opt in out source destination

Chain block_white_table (0 references)
pkts bytes target prot opt in out source destination

Chain bw_FORWARD (1 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 ! quota globalAlert: 52428800 bytes

Chain bw_INPUT (1 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 ! quota globalAlert: 2097152 bytes
196 48643 bw_costly_rmnet0 all -- rmnet0 * 0.0.0.0/0 0.0.0.0/0
15919 8160K all -- * * 0.0.0.0/0 0.0.0.0/0 owner socket exists

Chain bw_OUTPUT (1 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 ! quota globalAlert: 2097152 bytes
231 44298 bw_costly_rmnet0 all -- * rmnet0 0.0.0.0/0 0.0.0.0/0
18949 3782K all -- * * 0.0.0.0/0 0.0.0.0/0 owner socket exists

Chain bw_VIDEOCALL_IN (1 references)
pkts bytes target prot opt in out source destination

Chain bw_VIDEOCALL_OUT (1 references)
pkts bytes target prot opt in out source destination

Chain bw_costly_rmnet0 (2 references)
pkts bytes target prot opt in out source destination
427 92941 bw_penalty_box all -- * * 0.0.0.0/0 0.0.0.0/0
427 92941 bw_roaming_reduction all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 ! quota rmnet0: 9223372036854775807 bytes reject-with icmp-port-unreachable

Chain bw_costly_shared (0 references)
pkts bytes target prot opt in out source destination
0 0 bw_penalty_box all -- * * 0.0.0.0/0 0.0.0.0/0

Chain bw_data_saver (1 references)
pkts bytes target prot opt in out source destination
21650 6901K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0

Chain bw_happy_box (1 references)
pkts bytes target prot opt in out source destination
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10032
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10046
1707 1279K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10034
6453 2592K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10020
931 193K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0-9999
21650 6901K bw_data_saver all -- * * 0.0.0.0/0 0.0.0.0/0

Chain bw_penalty_box (2 references)
pkts bytes target prot opt in out source destination
30741 11M bw_happy_box all -- * * 0.0.0.0/0 0.0.0.0/0

Chain bw_roaming_reduction (1 references)
pkts bytes target prot opt in out source destination

Chain bw_videocall_box (0 references)
pkts bytes target prot opt in out source destination

Chain fw_FORWARD (1 references)
pkts bytes target prot opt in out source destination

Chain fw_INPUT (1 references)
pkts bytes target prot opt in out source destination
17319 8255K fw_standby all -- * * 0.0.0.0/0 0.0.0.0/0

Chain fw_OUTPUT (1 references)
pkts bytes target prot opt in out source destination
20704 4008K fw_standby all -- * * 0.0.0.0/0 0.0.0.0/0

Chain fw_dozable (0 references)
pkts bytes target prot opt in out source destination
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10199
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1000
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1001
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 1027
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 5002
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10006
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10015
1433 312K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10020
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10021
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10032
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10034
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10041
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10046
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10059
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10072
1 40 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10075
118 29877 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10076
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10096
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10138
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10141
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10142
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10154
0 0 RETURN all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 RETURN all -- * lo 0.0.0.0/0 0.0.0.0/0
162 7532 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x04/0x04
0 0 RETURN esp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:5060
0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:5060
116 12858 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0-9999
1095 80443 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

Chain fw_powersave (0 references)
pkts bytes target prot opt in out source destination
0 0 RETURN all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 RETURN all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x04/0x04
0 0 RETURN esp -- * * 0.0.0.0/0 0.0.0.0/0
0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:5060
0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:5060
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 0-9999
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

Chain fw_standby (2 references)
pkts bytes target prot opt in out source destination
17 1266 RETURN all -- lo * 0.0.0.0/0 0.0.0.0/0
17 1266 RETURN all -- * lo 0.0.0.0/0 0.0.0.0/0
789 33836 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x04/0x04
37200 12M fw_standby_uid all -- * * 0.0.0.0/0 0.0.0.0/0

Chain fw_standby_uid (1 references)
pkts bytes target prot opt in out source destination
0 0 RETURN all -- lo * 0.0.0.0/0 0.0.0.0/0
0 0 RETURN all -- * lo 0.0.0.0/0 0.0.0.0/0
0 0 RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x04/0x04
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10202
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10201
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10200
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10198
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10197
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10196
181 10860 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10195
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10192
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10191
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10188
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10187
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10184
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10183
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10182
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10179
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10178
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10177
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10175
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10173
52 3120 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10172
14 840 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10167
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10161
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10160
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10159
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10158
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10157
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10155
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10152
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10145
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10144
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10132
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10124
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10121
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10118
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10113
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10109
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10106
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10105
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10102
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10099
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10093
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10086
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10081
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10080
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10073
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10069
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10062
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10061
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10050
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10048
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10043
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10040
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10039
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10037
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10030
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10024
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10022
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10018
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10014
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10011
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10137
8 480 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10164
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10143
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10033
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10005
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10095
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10058
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10049
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10044
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10035
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10055
4 240 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10189
18 1080 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10194
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10166
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10185
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10135
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10065
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10190
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10171
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10088
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10123
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10122
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10052
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10047
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10174
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10186
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10054
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10097
16 960 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10009
72 4320 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 owner UID match 10163

Chain knox_vpn_filter_input_drop (1 references)
pkts bytes target prot opt in out source destination

Chain knox_vpn_filter_input_exempt (1 references)
pkts bytes target prot opt in out source destination

Chain knox_vpn_filter_output_act (1 references)
pkts bytes target prot opt in out source destination

Chain knox_vpn_filter_output_drop (1 references)
pkts bytes target prot opt in out source destination

Chain natctrl_FORWARD (1 references)
pkts bytes target prot opt in out source destination
1711 88620 TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
35493 30M natctrl_tether_counters all -- rmnet0 wlan0 0.0.0.0/0 0.0.0.0/0 [goto] state RELATED,ESTABLISHED
0 0 DROP all -- wlan0 rmnet0 0.0.0.0/0 0.0.0.0/0 state INVALID
26583 4347K natctrl_tether_counters all -- wlan0 rmnet0 0.0.0.0/0 0.0.0.0/0 [goto]
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0

Chain natctrl_tether_counters (2 references)
pkts bytes target prot opt in out source destination
53324 12M RETURN all -- wlan0 rmnet0 0.0.0.0/0 0.0.0.0/0
67662 52M RETURN all -- rmnet0 wlan0 0.0.0.0/0 0.0.0.0/0

Chain oem_fwd (1 references)
pkts bytes target prot opt in out source destination

Chain oem_out (1 references)
pkts bytes target prot opt in out source destination

Chain st_OUTPUT (1 references)
pkts bytes target prot opt in out source destination

Chain st_clear_caught (2 references)
pkts bytes target prot opt in out source destination

Chain st_clear_detect (0 references)
pkts bytes target prot opt in out source destination
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 connmark match 0x2000000/0x2000000 reject-with icmp-port-unreachable
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 connmark match 0x1000000/0x1000000
0 0 CONNMARK tcp -- * * 0.0.0.0/0 0.0.0.0/0 u32 "0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x0&0xffff0000=0x16030000&&0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x4&0xff0000=0x10000" CONNMARK or 0x1000000
0 0 CONNMARK udp -- * * 0.0.0.0/0 0.0.0.0/0 u32 "0x0>>0x16&0x3c@0x8&0xffff0000=0x16fe0000&&0x0>>0x16&0x3c@0x14&0xff0000=0x10000" CONNMARK or 0x1000000
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 connmark match 0x1000000/0x1000000
0 0 st_clear_caught tcp -- * * 0.0.0.0/0 0.0.0.0/0 state ESTABLISHED u32 "0x0>>0x16&0x3c@0xc>>0x1a&0x3c@0x0&0x0=0x0"
0 0 st_clear_caught udp -- * * 0.0.0.0/0 0.0.0.0/0

Chain st_penalty_log (0 references)
pkts bytes target prot opt in out source destination
0 0 CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK or 0x1000000
0 0 NFLOG all -- * * 0.0.0.0/0 0.0.0.0/0

Chain st_penalty_reject (0 references)
pkts bytes target prot opt in out source destination
0 0 CONNMARK all -- * * 0.0.0.0/0 0.0.0.0/0 CONNMARK or 0x2000000
0 0 NFLOG all -- * * 0.0.0.0/0 0.0.0.0/0
0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable



iptables -L -v -n -t nat sur le tél:
Chain PREROUTING (policy ACCEPT 15 packets, 2538 bytes)
pkts bytes target prot opt in out source destination
3493 983K oem_nat_pre all -- * * 0.0.0.0/0 0.0.0.0/0
3493 983K natctrl_nat_PREROUTING all -- * * 0.0.0.0/0 0.0.0.0/0

Chain INPUT (policy ACCEPT 2 packets, 157 bytes)
pkts bytes target prot opt in out source destination

Chain OUTPUT (policy ACCEPT 40 packets, 2511 bytes)
pkts bytes target prot opt in out source destination

Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
53 4892 MASQUERADE all -- * * 0.0.0.0/0 0.0.0.0/0

Chain natctrl_nat_POSTROUTING (0 references)
pkts bytes target prot opt in out source destination
1976 438K MASQUERADE all -- * rmnet0 0.0.0.0/0 0.0.0.0/0

Chain natctrl_nat_PREROUTING (1 references)
pkts bytes target prot opt in out source destination

Chain oem_nat_pre (1 references)
pkts bytes target prot opt in out source destination



Un petit schéma de mon réseau pour y voir plus clair:



Afficher la suite 

Votre réponse

3 réponses

Meilleure réponse
Messages postés
83613
Date d'inscription
lundi 16 juillet 2001
Statut
Modérateur
Dernière intervention
21 mai 2019
7555
1
Merci
Salut,
tu es en train de nous noyer sous bien trop de choses là .
Quels sont les logs du VPS pour iptables ?
active la règle de forwarding de ton port 3074 avec des logs dessus.
et arrête de nous noyer avec le reste.

Dire « Merci » 1

Heureux de vous avoir aidé ! Vous nous appréciez ? Donnez votre avis sur nous ! Evaluez CommentCaMarche

CCM 39362 internautes nous ont dit merci ce mois-ci

0917725929
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
-
Salut,

Désolé pour le flots d'infos, j'ai cru bien faire.

J'ai activé ces deux règles :

iptables -A FORWARD -p tcp -d 10.8.0.6/32 --dport 3074 -m state --state NEW,ESTABLISHED,RELATED -j LOG
iptables -A FORWARD -p udp -d 10.8.0.6/32 --dport 3074 -m state --state NEW,ESTABLISHED,RELATED -j LOG


Quand je consulte le log avec
tailf /var/log/kern.log
il n'y a rien.

J'ai aussi essayé ça
iptables -A FORWARD -i tun0 -j LOG
iptables -A FORWARD -o tun0 -j LOG


Ca ne donne rien.
0917725929
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
-
EDIT:

Si je fais ça :
iptables -A INPUT -p tcp -s 37.164.195.152 -j LOG (mon ip publique Free)


Et que je tente une co sur le port j'ai ça en résultat:
71:~# tailf /var/log/kern.log
Apr 23 18:27:46 vpsXXXXX kernel: [ 4.162001] input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:01.2/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input6
Apr 23 18:27:46 vpsXXXXX kernel: [ 4.162126] hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Pointer [QEMU QEMU USB Tablet] on usb-0000:00:01.2-1/input0
Apr 23 18:27:46 vpsXXXXX kernel: [ 4.197977] Console: switching to colour frame buffer device 128x48
Apr 23 18:27:46 vpsXXXXX kernel: [ 4.259570] cirrus 0000:00:02.0: fb0: cirrusdrmfb frame buffer device
Apr 23 18:27:46 vpsXXXXX kernel: [ 4.266350] [drm] Initialized cirrus 1.0.0 20110418 for 0000:00:02.0 on minor 0
Apr 23 18:27:46 vpsXXXXX kernel: [ 5.212081] random: crng init done
Apr 23 18:27:46 vpsXXXXX kernel: [ 5.213081] random: 7 urandom warning(s) missed due to ratelimiting
Apr 23 18:27:46 vpsXXXXX kernel: [ 9.168747] tun: Universal TUN/TAP device driver, 1.6
Apr 23 18:27:46 vpsXXXXX kernel: [ 9.194206] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
Apr 23 18:28:26 vpsXXXXX kernel: [ 49.626052] nf_conntrack version 0.5.0 (16384 buckets, 65536 max)
Apr 23 18:34:07 vpsXXXXX kernel: [ 389.926110] IN=ens3 OUT= MAC=fa:16:3e:5f:e5:f7:56:8d:6c:52:76:08:08:00 SRC=37.164.195.152 DST=XX.XX.XX.XX LEN=52 TOS=0x00 PREC=0x00 TTL=110 ID=18793 DF PROTO=TCP SPT=3545 DPT=2346 WINDOW=8192 RES=0x00 SYN URGP=0
Apr 23 18:34:07 vpsXXXXX kernel: [ 390.506527] IN=ens3 OUT= MAC=fa:16:3e:5f:e5:f7:56:8d:6c:52:76:08:08:00 SRC=37.164.195.152 DST=XX.XX.XX.XX LEN=52 TOS=0x00 PREC=0x00 TTL=110 ID=18796 DF PROTO=TCP SPT=3545 DPT=2346 WINDOW=8192 RES=0x00 SYN URGP=0
Apr 23 18:34:08 vpsXXXXX kernel: [ 391.086057] IN=ens3 OUT= MAC=fa:16:3e:5f:e5:f7:56:8d:6c:52:76:08:08:00 SRC=37.164.195.152 DST=XX.XX.XX.XX LEN=48 TOS=0x00 PREC=0x00 TTL=110 ID=18798 DF PROTO=TCP SPT=3545 DPT=2346 WINDOW=8192 RES=0x00 SYN URGP=0
iptables -A INPUT -p tcp -s 37.164.195.152 -j LOG
Commenter la réponse de brupala
Messages postés
83613
Date d'inscription
lundi 16 juillet 2001
Statut
Modérateur
Dernière intervention
21 mai 2019
7555
0
Merci
Salut,
J'ai regardé un peu ta config iptables du VPS,
a priori que ce soit forward ou nat permettent le passage de 2221 depuis ens3 vers le tunnel sur 2221 et 3074 .
Par contre les tests ftp, tu les faits bien sur l'adresse ens3 du VPS ?
Après, la XBOX,
il me semble bien qu'aujourd'hui, elle utilise massivement IPV6 et un tunnel Teredo pour les connexions sans ipv6, cas de la plupart des connexions mobiles encore.
il faudrait essayer de voir si le tunnel Teredo peut bien monter sur ta connexion VPN et ton VPS.
brupala
Messages postés
83613
Date d'inscription
lundi 16 juillet 2001
Statut
Modérateur
Dernière intervention
21 mai 2019
7555 > 0917725929
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
-
C'est bien ce que je pensais, la traduction de la source là:
sudo iptables -t nat -A POSTROUTING -p tcp -d 192.168.4.10 --dport 3074 -j SNAT --to-source 192.168.4.250
à quoi ça sert à part mettre la grouille ?
Ce qui est étrange, c'est que ça agit aussi sur UDP ....
aussi,
rajoute également cette commande pour UDP:
sudo iptables -t nat -A PREROUTING -p tcp --dport 3074 -j DNAT --to-destination 192.168.4.10
ou enlève carrément le -p tcp, si iptables veut bien.
0917725929
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
-
Ok, j'ai supprimé la règle POSTROUTING pour TCP et UDP (en fait rien d'étrange j'avais juste pmal cité mes tables iptables, j'ai édité mais tu avais déjà lu) et j'ai laissé PREROUTING pour udp et tcp. La xbox ne se connecte toujours pas, tours une erreur de MTU.

J'ai refait un tcp dump sur eth0

10:13:56.201889 MS NLB heartbeat, host priority: 715812852, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:13:58.203951 MS NLB heartbeat, host priority: 699035892, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:13:59.154018 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 57972+ A? PIFLC.XBOXLIVE.COM. (36)
10:13:59.241309 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 57972 2/0/0 CNAME piflc.xlive.trafficmanager.net., A 40.90.217.196 (96)
10:13:59.254028 IP 192.168.4.10.34957 > 40.90.217.196.http: Flags [S], seq 663463318, win 17212, options [mss 1324,nop,wscale 0,nop,nop,sackOK], length 0
10:13:59.444460 IP 40.90.217.196.http > 192.168.4.10.34957: Flags [S.], seq 1164213946, ack 663463319, win 8192, options [mss 1273,nop,wscale 8,nop,nop,sack$
10:13:59.444705 IP 192.168.4.10.34957 > 40.90.217.196.http: Flags [.], ack 1, win 17212, length 0
10:13:59.454277 IP 192.168.4.10.34957 > 40.90.217.196.http: Flags [P.], seq 1:393, ack 1, win 17212, length 392: HTTP: POST /vortex/logbinary.ashx HTTP/1.0
10:13:59.793727 IP 40.90.217.196.http > 192.168.4.10.34957: Flags [FP.], seq 1:183, ack 393, win 1024, length 182: HTTP: HTTP/1.1 200 OK
10:13:59.793950 IP 192.168.4.10.34957 > 40.90.217.196.http: Flags [.], ack 184, win 17030, length 0
10:13:59.804623 IP 192.168.4.10.34957 > 40.90.217.196.http: Flags [F.], seq 393, ack 184, win 17030, length 0
10:14:00.004286 IP 40.90.217.196.http > 192.168.4.10.34957: Flags [.], ack 394, win 1024, length 0
10:14:00.206054 MS NLB heartbeat, host priority: 682258932, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:02.208234 MS NLB heartbeat, host priority: 665481972, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:02.661361 IP any-in-2015.1e100.net.https > 192.168.4.10.65312: Flags [P.], seq 1784369357:1784369412, ack 1403937141, win 401, length 55
10:14:02.661509 IP any-in-2015.1e100.net.https > 192.168.4.10.65312: Flags [F.], seq 55, ack 1, win 401, length 0
10:14:02.761573 IP any-in-2015.1e100.net.https > 192.168.4.10.65312: Flags [F.], seq 55, ack 1, win 401, length 0
10:14:03.070778 IP any-in-2015.1e100.net.https > 192.168.4.10.65312: Flags [FP.], seq 0:55, ack 1, win 401, length 55
10:14:03.601808 IP any-in-2015.1e100.net.https > 192.168.4.10.65312: Flags [FP.], seq 0:55, ack 1, win 401, length 55
10:14:04.210280 MS NLB heartbeat, host priority: 648705012, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:04.914084 IP any-in-2015.1e100.net.https > 192.168.4.10.65312: Flags [FP.], seq 0:55, ack 1, win 401, length 55
10:14:06.212376 MS NLB heartbeat, host priority: 631928052, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:07.168081 IP any-in-2015.1e100.net.https > 192.168.4.10.65312: Flags [FP.], seq 0:55, ack 1, win 401, length 55
10:14:07.787017 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
10:14:07.787259 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
10:14:08.214496 MS NLB heartbeat, host priority: 615151092, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:10.216603 MS NLB heartbeat, host priority: 598374132, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:11.467836 IP any-in-2015.1e100.net.https > 192.168.4.10.65312: Flags [FP.], seq 0:55, ack 1, win 401, length 55
10:14:12.218744 MS NLB heartbeat, host priority: 581597172, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:13.106525 IP fra02-008.ff.avast.com.http > 192.168.4.10.65247: Flags [P.], seq 778534971:778535125, ack 992058281, win 3, length 154: HTTP: HTTP/1.1 2$
10:14:14.220811 MS NLB heartbeat, host priority: 564820212, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:15.157983 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
10:14:16.222931 MS NLB heartbeat, host priority: 548043252, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:18.225070 MS NLB heartbeat, host priority: 531266292, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:20.227131 MS NLB heartbeat, host priority: 514489332, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:20.479539 IP any-in-2015.1e100.net.https > 192.168.4.10.65312: Flags [FP.], seq 0:55, ack 1, win 401, length 55
10:14:22.279316 MS NLB heartbeat, host priority: 497712372, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:24.298378 MS NLB heartbeat, host priority: 480935412, cluster IP: m116-66.leader.edu.tw, host IP: 89-72-241-148.dynamic.chello.pl
10:14:24.700394 MS NLB heartbeat, host priority: 3191202919, cluster IP: 0.172.225.225, host IP: iqq219.internetdsl.tpnet.pl
10:14:24.730802 IP 0.0.0.0 > igmp.mcast.net: igmp v3 report, 1 group record(s)
10:14:24.730905 IP 0.0.0.0.17275 > 239.255.255.250.1900: UDP, length 190
10:14:24.731002 IP 0.0.0.0.17275 > 239.255.255.250.1900: UDP, length 246
10:14:24.731023 IP 0.0.0.0.17275 > 239.255.255.250.1900: UDP, length 199
10:14:24.731042 IP 0.0.0.0.17275 > 239.255.255.250.1900: UDP, length 244
10:14:24.731123 IP 0.0.0.0.17275 > 239.255.255.250.1900: UDP, length 256
10:14:24.731142 IP 0.0.0.0.17275 > 239.255.255.250.1900: UDP, length 254
10:14:24.791634 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
10:14:25.792717 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
10:14:26.717252 MS NLB heartbeat, host priority: 3174425959, cluster IP: 0.172.225.225, host IP: iqq219.internetdsl.tpnet.pl
10:14:26.793745 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
10:14:27.794793 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
10:14:28.795865 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
10:14:29.796907 ARP, Request who-has 192.168.4.250 tell 192.168.4.10, length 46
10:14:29.796943 ARP, Reply 192.168.4.250 is-at b8:27:eb:76:6c:d5 (oui Unknown), length 28
10:14:29.797126 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
10:14:29.802851 IP 192.168.4.10 > igmp.mcast.net: igmp v3 report, 1 group record(s)
10:14:29.820518 ARP, Request who-has 192.168.4.250 tell 192.168.4.10, length 46
10:14:29.820534 ARP, Reply 192.168.4.250 is-at b8:27:eb:76:6c:d5 (oui Unknown), length 28
10:14:29.820722 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 57987+ A? XEXDS.XBOXLIVE.COM. (36)
brupala
Messages postés
83613
Date d'inscription
lundi 16 juillet 2001
Statut
Modérateur
Dernière intervention
21 mai 2019
7555 > 0917725929
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
-
Il y a toujours quelque chose qui ne va pas dans le forwarding nat du port 3074, une traduction de l'adresse source en trop:
13:39:29.222074 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:31.231057 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:31.231125 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:38.269081 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:38.269157 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:40.081073 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:40.081120 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:42.083095 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:42.083142 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:44.086072 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:44.086118 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:46.096091 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:3

on se retrouve avec source == destination == 192.168.4.10
0917725929
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
-
Désolé pour le double post. J'ai également supprimé sur le VPS les POSTROUTING sur les ports tcp et udp, comme fait précédement sur le PI. Ensuite j'ai fais un TCP dump simultanément sur le vps et le pi.

Le VPS:
13:44:17.449703 IP 192.0.73.2.443 > 10.8.0.6.49335: Flags [P.], seq 338119472:338119511, ack 3001466807, win 62, length 39
13:44:17.771650 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 550314770, ack 2711455091, win 354, length 0
13:44:19.275463 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:19.275527 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:19.275553 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:19.276165 IP 10.8.0.6 > 192.0.73.2: ICMP host 10.8.0.6 unreachable, length 87
13:44:19.276202 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:19.851585 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:20.971626 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:21.801604 IP 192.0.73.2.443 > 10.8.0.6.49335: Flags [P.], seq 0:39, ack 1, win 62, length 39
13:44:22.468665 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:22.468697 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:22.475563 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:22.475588 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:22.475608 IP 10.8.0.6 > 192.0.73.2: ICMP host 10.8.0.6 unreachable, length 87
13:44:22.654528 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 3448433740:3448433894, ack 2910105006, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:22.654618 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [.], seq 154:1427, ack 1, win 1, length 1273: HTTP
13:44:22.654622 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [.], seq 1427:2700, ack 1, win 1, length 1273: HTTP
13:44:22.654624 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [.], seq 2700:3973, ack 1, win 1, length 1273: HTTP
13:44:22.654625 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [.], seq 3973:5246, ack 1, win 1, length 1273: HTTP
13:44:22.654627 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [.], seq 5246:6519, ack 1, win 1, length 1273: HTTP
13:44:22.654629 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [.], seq 6519:7792, ack 1, win 1, length 1273: HTTP
13:44:22.654631 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [.], seq 7792:9065, ack 1, win 1, length 1273: HTTP
13:44:22.654633 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [.], seq 9065:10338, ack 1, win 1, length 1273: HTTP
13:44:22.934508 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:23.051614 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:23.496773 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:24.171580 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:24.619605 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:25.668709 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:25.668741 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:25.675819 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 202
13:44:25.675977 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 556
13:44:25.676052 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 556
13:44:25.676112 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 556
13:44:25.676676 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 556
13:44:25.676903 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 556
13:44:25.676941 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:25.676966 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:25.738432 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:26.251579 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:27.371600 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:27.986399 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:28.868651 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:28.868692 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:28.875671 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 202
13:44:28.875735 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:28.875759 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:28.875773 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 202
13:44:29.107156 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:29.451710 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:30.249404 IP 192.0.73.2.443 > 10.8.0.6.49335: Flags [P.], seq 0:39, ack 1, win 62, length 39
13:44:30.571599 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:31.354359 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:32.068583 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:32.068625 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:32.075609 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 202
13:44:32.075663 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:32.075694 IP 10.8.0.6 > 192.0.73.2: ICMP host 10.8.0.6 unreachable, length 87
13:44:32.075720 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:32.075735 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 202
13:44:32.475355 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:32.651575 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:33.771649 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:34.722338 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:35.268720 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:35.268764 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:35.275585 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 202
13:44:35.275640 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:35.275665 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:35.275683 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 202
13:44:35.844343 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:35.851663 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:36.971604 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:38.090277 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:38.448469 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:38.448542 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:38.455321 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 202
13:44:38.455440 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:38.455495 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:38.455552 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 202
13:44:39.019596 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:39.212288 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:40.139622 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:41.458199 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:41.648207 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:41.648266 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:41.655941 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:41.655990 IP 10.8.0.6 > 77.234.45.65: ICMP host 10.8.0.6 unreachable, length 202
13:44:41.656048 IP 10.8.0.6 > 10.8.0.1: ICMP host 10.8.0.6 unreachable, length 48
13:44:42.219588 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:43.339676 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:43.702132 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:45.611583 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:47.401186 IP 192.0.73.2.443 > 10.8.0.6.49335: Flags [P.], seq 0:39, ack 1, win 62, length 39
13:44:48.186117 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:50.219629 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:44:55.095230 IP 10.8.0.6.1256 > 8.8.8.8.53: 58291+ A? XEXDS.XBOXLIVE.COM. (36)
13:44:55.195897 IP 8.8.8.8.53 > 10.8.0.6.1256: 58291 2/0/0 CNAME xexds.gtm.XBOXLIVE.COM., A 65.55.42.21 (76)
13:44:55.388004 IP 10.8.0.6.1256 > 8.8.8.8.53: 58299+ A? www.msftncsi.com. (34)
13:44:55.434322 IP 8.8.8.8.53 > 10.8.0.6.1256: 58299 4/0/0 CNAME www.msftncsi.com.edgesuite.net., CNAME a1961.g2.akamai.net., A 88.221.134.129, A 88.221.134.147 (140)
13:44:55.688394 IP 10.8.0.6.1256 > 8.8.8.8.53: 58303+ A? www.msftncsi.com. (34)
13:44:55.696825 IP 8.8.8.8.53 > 10.8.0.6.1256: 58303 4/0/0 CNAME www.msftncsi.com.edgesuite.net., CNAME a1961.g2.akamai.net., A 88.221.134.129, A 88.221.134.147 (140)
13:44:55.747945 IP 10.8.0.6.57690 > 88.221.134.129.80: Flags [S], seq 1249154386, win 17212, options [mss 1273,nop,wscale 0,nop,nop,sackOK], length 0
13:44:55.749024 IP 88.221.134.129.80 > 10.8.0.6.57690: Flags [S.], seq 3566220883, ack 1249154387, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
13:44:55.828063 IP 10.8.0.6.57690 > 88.221.134.129.80: Flags [.], ack 1, win 17212, length 0
13:44:55.835658 IP 10.8.0.6.57690 > 88.221.134.129.80: Flags [P.], seq 1:141, ack 1, win 17212, length 140: HTTP: GET /ncsi.txt HTTP/1.1
13:44:55.836751 IP 88.221.134.129.80 > 10.8.0.6.57690: Flags [.], ack 141, win 237, length 0
13:44:55.837234 IP 88.221.134.129.80 > 10.8.0.6.57690: Flags [P.], seq 1:185, ack 141, win 237, length 184: HTTP: HTTP/1.1 200 OK
13:44:55.948024 IP 10.8.0.6.57690 > 88.221.134.129.80: Flags [.], ack 185, win 17028, length 0
13:44:55.948088 IP 10.8.0.6.57690 > 88.221.134.129.80: Flags [F.], seq 141, ack 185, win 17028, length 0
13:44:55.949257 IP 88.221.134.129.80 > 10.8.0.6.57690: Flags [F.], seq 185, ack 142, win 237, length 0
13:44:56.027887 IP 10.8.0.6.57690 > 88.221.134.129.80: Flags [.], ack 186, win 17028, length 0
13:44:57.177951 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:44:59.179576 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:45:03.570661 IP 216.58.213.132.443 > 10.8.0.6.49330: Flags [P.], seq 3530247091:3530247146, ack 1012504189, win 248, length 55
13:45:03.570676 IP 216.58.213.132.443 > 10.8.0.6.49330: Flags [F.], seq 55, ack 1, win 248, length 0
13:45:03.715003 IP 216.58.213.132.443 > 10.8.0.6.49330: Flags [F.], seq 55, ack 1, win 248, length 0
13:45:03.987011 IP 216.58.213.132.443 > 10.8.0.6.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
13:45:04.531022 IP 216.58.213.132.443 > 10.8.0.6.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
13:45:05.083571 IP 74.125.140.189.443 > 10.8.0.6.49332: Flags [P.], seq 225699003:225699059, ack 3731654100, win 253, length 56
13:45:05.083604 IP 74.125.140.189.443 > 10.8.0.6.49332: Flags [F.], seq 56, ack 1, win 253, length 0
13:45:05.237495 IP 74.125.140.189.443 > 10.8.0.6.49332: Flags [F.], seq 56, ack 1, win 253, length 0
13:45:05.367796 IP 10.8.0.6.1256 > 8.8.8.8.53: 58325+ A? xncsi.xboxlive.com. (36)
13:45:05.388851 IP 8.8.8.8.53 > 10.8.0.6.1256: 58325 2/0/0 CNAME xncsi.xboxlive.com.akadns.net., A 52.142.89.40 (95)
13:45:05.512665 IP 74.125.140.189.443 > 10.8.0.6.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
13:45:05.567803 IP 10.8.0.6.31869 > 52.142.89.40.80: Flags [S], seq 1738332106, win 64876, options [mss 1273,nop,wscale 0,nop,nop,sackOK], length 0
13:45:05.579175 IP 52.142.89.40.80 > 10.8.0.6.31869: Flags [S.], seq 3878435337, ack 1738332107, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
13:45:05.619003 IP 216.58.213.132.443 > 10.8.0.6.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
13:45:05.627913 IP 10.8.0.6.31869 > 52.142.89.40.80: Flags [.], ack 1, win 64876, length 0
13:45:05.668118 IP 10.8.0.6.31869 > 52.142.89.40.80: Flags [P.], seq 1:97, ack 1, win 64876, length 96: HTTP: GET /XBOXNCSI.txt HTTP/1.0
13:45:05.679509 IP 52.142.89.40.80 > 10.8.0.6.31869: Flags [FP.], seq 1:249, ack 97, win 1024, length 248: HTTP: HTTP/1.1 200 OK
13:45:05.748312 IP 10.8.0.6.31869 > 52.142.89.40.80: Flags [.], ack 250, win 64628, length 0
13:45:05.868279 IP 10.8.0.6.31869 > 52.142.89.40.80: Flags [F.], seq 97, ack 250, win 64628, length 0
13:45:05.868341 IP 10.8.0.6.1256 > 8.8.8.8.53: 58332+ A? notice.xbox.com. (33)
13:45:05.879045 IP 52.142.89.40.80 > 10.8.0.6.31869: Flags [.], ack 98, win 1024, length 0
13:45:05.908834 IP 8.8.8.8.53 > 10.8.0.6.1256: 58332 4/0/0 CNAME notice.xbox.com.nsatc.net., CNAME wildcard.xbox.com.edgekey.net., CNAME e1822.dspb.akamaiedge.net., A 96.16.108.73 (164)
13:45:06.065523 IP 74.125.140.189.443 > 10.8.0.6.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
13:45:06.087843 IP 10.8.0.6.27343 > 96.16.108.73.80: Flags [S], seq 1764121731, win 64876, options [mss 1273,nop,wscale 0,nop,nop,sackOK], length 0
13:45:06.089103 IP 96.16.108.73.80 > 10.8.0.6.27343: Flags [S.], seq 3499227717, ack 1764121732, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
13:45:06.148027 IP 10.8.0.6.27343 > 96.16.108.73.80: Flags [.], ack 1, win 64876, length 0
13:45:07.169586 IP 74.125.140.189.443 > 10.8.0.6.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
13:45:07.795113 IP 216.58.213.132.443 > 10.8.0.6.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
13:45:09.035026 IP 10.8.0.6.27343 > 96.16.108.73.80: Flags [P.], seq 1:124, ack 1, win 64876, length 123: HTTP: GET /xocdata/xml/fr-FR/servicestatusChannel.xml HTTP/1.0
13:45:09.036151 IP 96.16.108.73.80 > 10.8.0.6.27343: Flags [.], ack 124, win 229, length 0
13:45:09.235911 IP 96.16.108.73.80 > 10.8.0.6.27343: Flags [P.], seq 1:760, ack 124, win 229, length 759: HTTP: HTTP/1.0 200 OK
13:45:09.294616 IP 96.16.108.73.80 > 10.8.0.6.27343: Flags [F.], seq 760, ack 124, win 229, length 0
13:45:09.377529 IP 74.125.140.189.443 > 10.8.0.6.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
13:45:09.378124 IP 10.8.0.6.27343 > 96.16.108.73.80: Flags [.], ack 760, win 64117, length 0
13:45:09.386821 IP 10.8.0.6.27343 > 96.16.108.73.80: Flags [.], ack 761, win 64117, length 0
13:45:10.007611 IP 10.8.0.6.27343 > 96.16.108.73.80: Flags [F.], seq 124, ack 761, win 64117, length 0
13:45:10.008734 IP 96.16.108.73.80 > 10.8.0.6.27343: Flags [.], ack 125, win 229, length 0
13:45:12.146997 IP 216.58.213.132.443 > 10.8.0.6.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
13:45:13.793560 IP 74.125.140.189.443 > 10.8.0.6.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
13:45:15.161841 IP 77.234.45.65.80 > 10.8.0.6.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
13:45:17.355610 IP 10.8.0.1.80 > 10.8.0.6.49333: Flags [F.], seq 0, ack 1, win 354, length 0
13:45:20.851117 IP 216.58.213.132.443 > 10.8.0.6.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
13:45:22.216944 IP 192.0.73.2.443 > 10.8.0.6.49335: Flags [P.], seq 0:39, ack 1, win 62, length 39
13:45:22.625570 IP 74.125.140.189.443 > 10.8.0.6.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56




sur le Pi:
12:44:44.467715 IP 0.0.0.0 > igmp.mcast.net: igmp v3 report, 1 group record(s)
12:44:44.467815 IP 0.0.0.0.23728 > 239.255.255.250.1900: UDP, length 190
12:44:44.467954 IP 0.0.0.0.23728 > 239.255.255.250.1900: UDP, length 246
12:44:44.467972 IP 0.0.0.0.23728 > 239.255.255.250.1900: UDP, length 199
12:44:44.467991 IP 0.0.0.0.23728 > 239.255.255.250.1900: UDP, length 244
12:44:44.468005 IP 0.0.0.0.23728 > 239.255.255.250.1900: UDP, length 256
12:44:44.468019 IP 0.0.0.0.23728 > 239.255.255.250.1900: UDP, length 254
12:44:44.485424 MS NLB heartbeat, host priority: 543815028, cluster IP: 128.173.33.176, host IP: abts-north-static-219.216.160.122.airtelbroadband.in
12:44:44.627916 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
12:44:44.634537 IP 192.168.4.10 > igmp.mcast.net: igmp v3 report, 1 group record(s)
12:44:44.667956 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 335
12:44:44.701390 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 391
12:44:44.717071 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
12:44:44.768058 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 344
12:44:44.868192 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 389
12:44:45.001648 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 401
12:44:45.135088 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 399
12:44:45.157096 IP6 :: > ff02::1:ff61:e5ae: ICMP6, neighbor solicitation, who has fe80::5901:2711:ab61:e5ae, length 32
12:44:45.207249 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
12:44:45.301972 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 335
12:44:45.502172 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 391
12:44:45.627060 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
12:44:45.735689 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 344
12:44:45.833866 IP 10.8.0.1.http > 192.168.4.10.49333: Flags [F.], seq 550314770, ack 2711455091, win 354, length 0
12:44:45.969309 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 389
12:44:46.187183 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
12:44:46.188036 IP6 fe80::5901:2711:ab61:e5ae > ip6-allrouters: ICMP6, router solicitation, length 16
12:44:46.217081 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
12:44:46.236251 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 401
12:44:46.408643 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
12:44:46.409031 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
12:44:46.409646 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 1/0/0 (Cache flush) A 192.168.4.250 (45)
12:44:46.467032 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 2 group record(s), length 48
12:44:46.520974 MS NLB heartbeat, host priority: 527038068, cluster IP: 128.173.33.176, host IP: abts-north-static-219.216.160.122.airtelbroadband.in
12:44:46.536513 IP 192.168.4.10.58603 > 239.255.255.250.1900: UDP, length 399
12:44:46.658707 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
12:44:46.659038 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
12:44:46.857041 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
12:44:46.909608 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
12:44:46.909952 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
12:44:46.910583 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 1/0/0 (Cache flush) A 192.168.4.250 (45)
12:44:47.109734 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
12:44:47.110080 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
12:44:47.472160 IP 192.0.73.2.https > 192.168.4.10.49335: Flags [P.], seq 338119472:338119511, ack 3001466807, win 62, length 39
12:44:48.280583 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
12:44:48.280934 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
12:44:48.291260 IP fra02-006.ff.avast.com.http > 192.168.4.10.49337: Flags [P.], seq 3448433740:3448433894, ack 2910105006, win 1, length 154: HTTP: HTTP/1.1 200 OK
12:44:48.556238 MS NLB heartbeat, host priority: 510261108, cluster IP: 128.173.33.176, host IP: abts-north-static-219.216.160.122.airtelbroadband.in
12:44:49.707026 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
12:44:49.707273 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
12:44:49.926214 MS NLB heartbeat, host priority: 1254509535, cluster IP: ppp-158-52.26-151.wind.it, host IP: 162.37.205.0
12:44:49.939930 IP 0.0.0.0 > igmp.mcast.net: igmp v3 report, 1 group record(s)
12:44:49.940016 IP 0.0.0.0.58603 > 239.255.255.250.1900: UDP, length 190
12:44:49.940134 IP 0.0.0.0.58603 > 239.255.255.250.1900: UDP, length 246
12:44:49.940181 IP 0.0.0.0.58603 > 239.255.255.250.1900: UDP, length 199
12:44:49.940198 IP 0.0.0.0.58603 > 239.255.255.250.1900: UDP, length 244
12:44:49.940215 IP 0.0.0.0.58603 > 239.255.255.250.1900: UDP, length 256
12:44:49.940265 IP 0.0.0.0.58603 > 239.255.255.250.1900: UDP, length 254
12:44:50.033998 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
12:44:50.088845 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
12:44:50.189110 IP6 fe80::5901:2711:ab61:e5ae > ip6-allrouters: ICMP6, router solicitation, length 16
12:44:50.247115 ARP, Request who-has 169.254.169.44 tell 0.0.0.0, length 28
12:44:50.262253 IP 10.8.0.1.http > 192.168.4.10.49333: Flags [F.], seq 0, ack 1, win 354, length 0
12:44:50.452469 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
12:44:50.452820 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
12:44:51.035036 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
12:44:51.168653 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
12:44:51.168810 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
12:44:51.471674 ARP, Request who-has 169.254.169.44 tell 0.0.0.0, length 28
12:44:51.942973 MS NLB heartbeat, host priority: 1237732575, cluster IP: ppp-158-52.26-151.wind.it, host IP: 162.37.205.0
12:44:52.036040 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
12:44:52.169949 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
12:44:52.170095 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
12:44:53.037055 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
12:44:53.160326 ARP, Request who-has 169.254.169.44 tell 0.0.0.0, length 28
12:44:54.038061 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
12:44:54.172229 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
12:44:54.172371 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
12:44:54.190353 IP6 fe80::5901:2711:ab61:e5ae > ip6-allrouters: ICMP6, router solicitation, length 16
12:44:55.039080 ARP, Request who-has 192.168.4.250 tell 192.168.4.10, length 46
12:44:55.039120 ARP, Reply 192.168.4.250 is-at b8:27:eb:76:6c:d5 (oui Unknown), length 28
12:44:55.039295 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
12:44:55.045113 IP 192.168.4.10 > igmp.mcast.net: igmp v3 report, 1 group record(s)
12:44:55.046100 ARP, Request who-has 192.168.4.250 tell 192.168.4.10, length 46
12:44:55.046118 ARP, Reply 192.168.4.250 is-at b8:27:eb:76:6c:d5 (oui Unknown), length 28
12:44:55.046295 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 58291+ A? XEXDS.XBOXLIVE.COM. (36)
12:44:55.078521 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 335
12:44:55.111898 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 391
12:44:55.162014 ARP, Request who-has 169.254.169.44 tell 169.254.169.44, length 28
12:44:55.178679 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 344
12:44:55.258667 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 58291 2/0/0 CNAME xexds.gtm.XBOXLIVE.COM., A 65.55.42.21 (76)
12:44:55.278725 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 389
12:44:55.346627 IP 192.168.4.10.1258 > 65.55.42.21.3074: UDP, length 1336
12:44:55.346759 IP 192.168.4.10.1258 > 192.168.4.10.3074: UDP, length 1336
12:44:55.346769 IP 192.168.4.10.1259 > 65.55.42.21.3074: UDP, length 200
12:44:55.346810 IP 192.168.4.10.1259 > 192.168.4.10.3074: UDP, length 200
12:44:55.378725 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 58299+ A? www.msftncsi.com. (34)
12:44:55.383358 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? 44.169.254.169.in-addr.arpa. ANY (QM)? raspberrypi.local. (98)
12:44:55.383749 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) A 192.168.4.250, (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (73)
12:44:55.412203 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 401
12:44:55.545676 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 399
12:44:55.633645 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? 44.169.254.169.in-addr.arpa. ANY (QM)? raspberrypi.local. (98)
12:44:55.664253 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 58299 4/0/0 CNAME www.msftncsi.com.edgesuite.net., CNAME a1961.g2.akamai.net., A 88.221.134.129, A 88.221.134.147 (140)
12:44:55.679136 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 58303+ A? www.msftncsi.com. (34)
12:44:55.729145 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 335
12:44:55.739281 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 58303 4/0/0 CNAME www.msftncsi.com.edgesuite.net., CNAME a1961.g2.akamai.net., A 88.221.134.129, A 88.221.134.147 (140)
12:44:55.745757 IP 192.168.4.10.57690 > a88-221-134-129.deploy.static.akamaitechnologies.com.http: Flags [S], seq 1249154386, win 17212, options [mss 1324,nop,wscale 0,nop,nop,sackOK], length 0
12:44:55.818441 IP a88-221-134-129.deploy.static.akamaitechnologies.com.http > 192.168.4.10.57690: Flags [S.], seq 3566220883, ack 1249154387, win 29200, options [mss 1273,nop,nop,sackOK,nop,wscale 7], length 0
12:44:55.818644 IP 192.168.4.10.57690 > a88-221-134-129.deploy.static.akamaitechnologies.com.http: Flags [.], ack 1, win 17212, length 0
12:44:55.829232 IP 192.168.4.10.57690 > a88-221-134-129.deploy.static.akamaitechnologies.com.http: Flags [P.], seq 1:141, ack 1, win 17212, length 140: HTTP: GET /ncsi.txt HTTP/1.1
12:44:55.884706 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? 44.169.254.169.in-addr.arpa. ANY (QM)? raspberrypi.local. (98)
12:44:55.885078 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) A 192.168.4.250, (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (73)
12:44:55.929361 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 391
12:44:55.943464 IP a88-221-134-129.deploy.static.akamaitechnologies.com.http > 192.168.4.10.57690: Flags [.], ack 141, win 237, length 0
12:44:55.943627 IP a88-221-134-129.deploy.static.akamaitechnologies.com.http > 192.168.4.10.57690: Flags [P.], seq 1:185, ack 141, win 237, length 184: HTTP: HTTP/1.1 200 OK
12:44:55.943813 IP 192.168.4.10.57690 > a88-221-134-129.deploy.static.akamaitechnologies.com.http: Flags [.], ack 185, win 17028, length 0
12:44:55.946006 IP 192.168.4.10.57690 > a88-221-134-129.deploy.static.akamaitechnologies.com.http: Flags [F.], seq 141, ack 185, win 17028, length 0
12:44:56.018144 IP a88-221-134-129.deploy.static.akamaitechnologies.com.http > 192.168.4.10.57690: Flags [F.], seq 185, ack 142, win 237, length 0
12:44:56.018330 IP 192.168.4.10.57690 > a88-221-134-129.deploy.static.akamaitechnologies.com.http: Flags [.], ack 186, win 17028, length 0
12:44:56.084898 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) A 169.254.169.44 (86)
12:44:56.146254 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 344
12:44:56.379862 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 389
12:44:56.646790 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 401
12:44:56.947067 IP 192.168.4.10.17253 > 239.255.255.250.1900: UDP, length 399
12:44:57.164344 ARP, Request who-has 169.254.169.44 tell 169.254.169.44, length 28
12:44:57.216906 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 3/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) A 169.254.169.44, (Cache flush) A 192.168.4.250 (102)
12:44:57.303023 IP fra02-006.ff.avast.com.http > 192.168.4.10.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
12:44:57.348658 IP 192.168.4.10.1258 > 65.55.42.21.3074: UDP, length 1336
12:44:57.348759 IP 192.168.4.10.1258 > 192.168.4.10.3074: UDP, length 1336
12:44:57.348770 IP 192.168.4.10.1259 > 65.55.42.21.3074: UDP, length 200
12:44:57.348799 IP 192.168.4.10.1259 > 192.168.4.10.3074: UDP, length 200
12:44:57.372735 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
12:44:58.191742 IP6 fe80::5901:2711:ab61:e5ae > ip6-allrouters: ICMP6, router solicitation, length 16
12:44:59.349239 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 3/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) A 169.254.169.44, (Cache flush) A 192.168.4.250 (102)
12:44:59.350679 IP 192.168.4.10.1258 > 65.55.42.21.3074: UDP, length 1336
12:44:59.350780 IP 192.168.4.10.1258 > 192.168.4.10.3074: UDP, length 1336
12:44:59.350790 IP 192.168.4.10.1259 > 65.55.42.21.3074: UDP, length 200
12:44:59.350816 IP 192.168.4.10.1259 > 192.168.4.10.3074: UDP, length 200
12:44:59.350967 IP 10.8.0.1.http > 192.168.4.10.49333: Flags [F.], seq 0, ack 1, win 354, length 0
12:45:01.352731 IP 192.168.4.10.1258 > 65.55.42.21.3074: UDP, length 1336
12:45:01.352837 IP 192.168.4.10.1258 > 192.168.4.10.3074: UDP, length 1336
12:45:01.352850 IP 192.168.4.10.1259 > 65.55.42.21.3074: UDP, length 200
12:45:01.352883 IP 192.168.4.10.1259 > 192.168.4.10.3074: UDP, length 200
12:45:03.354857 IP 192.168.4.10.1258 > 65.55.42.21.3074: UDP, length 1336
12:45:03.354987 IP 192.168.4.10.1258 > 192.168.4.10.3074: UDP, length 1336
12:45:03.354999 IP 192.168.4.10.1259 > 65.55.42.21.3074: UDP, length 200
12:45:03.355027 IP 192.168.4.10.1259 > 192.168.4.10.3074: UDP, length 200
12:45:03.651519 IP par21s03-in-f132.1e100.net.https > 192.168.4.10.49330: Flags [P.], seq 3530247091:3530247146, ack 1012504189, win 248, length 55
12:45:03.651661 IP par21s03-in-f132.1e100.net.https > 192.168.4.10.49330: Flags [F.], seq 55, ack 1, win 248, length 0
12:45:03.778249 IP par21s03-in-f132.1e100.net.https > 192.168.4.10.49330: Flags [F.], seq 55, ack 1, win 248, length 0
12:45:04.265611 IP par21s03-in-f132.1e100.net.https > 192.168.4.10.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
12:45:04.607094 IP par21s03-in-f132.1e100.net.https > 192.168.4.10.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
12:45:05.303908 IP wq-in-f189.1e100.net.https > 192.168.4.10.49332: Flags [P.], seq 225699003:225699059, ack 3731654100, win 253, length 56
12:45:05.304044 IP wq-in-f189.1e100.net.https > 192.168.4.10.49332: Flags [F.], seq 56, ack 1, win 253, length 0
12:45:05.304169 IP wq-in-f189.1e100.net.https > 192.168.4.10.49332: Flags [F.], seq 56, ack 1, win 253, length 0
12:45:05.356639 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 58325+ A? xncsi.xboxlive.com. (36)
12:45:05.458358 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 58325 2/0/0 CNAME xncsi.xboxlive.com.akadns.net., A 52.142.89.40 (95)
12:45:05.556778 IP 192.168.4.10.31869 > 52.142.89.40.http: Flags [S], seq 1738332106, win 64876, options [mss 1324,nop,wscale 0,nop,nop,sackOK], length 0
12:45:05.578191 IP wq-in-f189.1e100.net.https > 192.168.4.10.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
12:45:05.622214 IP 52.142.89.40.http > 192.168.4.10.31869: Flags [S.], seq 3878435337, ack 1738332107, win 8192, options [mss 1273,nop,wscale 8,nop,nop,sackOK], length 0
12:45:05.622426 IP 192.168.4.10.31869 > 52.142.89.40.http: Flags [.], ack 1, win 64876, length 0
12:45:05.656888 IP 192.168.4.10.31869 > 52.142.89.40.http: Flags [P.], seq 1:97, ack 1, win 64876, length 96: HTTP: GET /XBOXNCSI.txt HTTP/1.0
12:45:05.662001 IP par21s03-in-f132.1e100.net.https > 192.168.4.10.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
12:45:05.740267 IP 52.142.89.40.http > 192.168.4.10.31869: Flags [FP.], seq 1:249, ack 97, win 1024, length 248: HTTP: HTTP/1.1 200 OK
12:45:05.740484 IP 192.168.4.10.31869 > 52.142.89.40.http: Flags [.], ack 250, win 64628, length 0
12:45:05.857114 IP 192.168.4.10.31869 > 52.142.89.40.http: Flags [F.], seq 97, ack 250, win 64628, length 0
12:45:05.857319 MS NLB heartbeat, host priority: 1326322994, cluster IP: 113.60.203.233, host IP: n147-090-000-000.static.online-age.net
12:45:05.857450 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 58332+ A? notice.xbox.com. (33)
12:45:05.938386 IP 52.142.89.40.http > 192.168.4.10.31869: Flags [.], ack 98, win 1024, length 0
12:45:05.969181 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 58332 4/0/0 CNAME notice.xbox.com.nsatc.net., CNAME wildcard.xbox.com.edgekey.net., CNAME e1822.dspb.akamaiedge.net., A 96.16.108.73 (164)
12:45:06.074019 IP 192.168.4.10.27343 > a96-16-108-73.deploy.static.akamaitechnologies.com.http: Flags [S], seq 1764121731, win 64876, options [mss 1324,nop,wscale 0,nop,nop,sackOK], length 0
12:45:06.108211 IP wq-in-f189.1e100.net.https > 192.168.4.10.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
12:45:06.132051 IP a96-16-108-73.deploy.static.akamaitechnologies.com.http > 192.168.4.10.27343: Flags [S.], seq 3499227717, ack 1764121732, win 29200, options [mss 1273,nop,nop,sackOK,nop,wscale 7], length 0
12:45:06.132238 IP 192.168.4.10.27343 > a96-16-108-73.deploy.static.akamaitechnologies.com.http: Flags [.], ack 1, win 64876, length 0
12:45:07.218340 IP wq-in-f189.1e100.net.https > 192.168.4.10.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
12:45:08.157071 IP par21s03-in-f132.1e100.net.https > 192.168.4.10.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
12:45:08.960094 MS NLB heartbeat, host priority: 1309546034, cluster IP: 113.60.203.233, host IP: n147-090-000-000.static.online-age.net
12:45:08.977155 IP 192.168.4.10.27343 > a96-16-108-73.deploy.static.akamaitechnologies.com.http: Flags [P.], seq 1:124, ack 1, win 64876, length 123: HTTP: GET /xocdata/xml/fr-FR/servicestatusChannel.xml HTTP/1.0
12:45:09.098399 IP a96-16-108-73.deploy.static.akamaitechnologies.com.http > 192.168.4.10.27343: Flags [.], ack 124, win 229, length 0
12:45:09.385849 IP a96-16-108-73.deploy.static.akamaitechnologies.com.http > 192.168.4.10.27343: Flags [P.], seq 1:760, ack 124, win 229, length 759: HTTP: HTTP/1.0 200 OK
12:45:09.385997 IP a96-16-108-73.deploy.static.akamaitechnologies.com.http > 192.168.4.10.27343: Flags [F.], seq 760, ack 124, win 229, length 0
12:45:09.386130 IP 192.168.4.10.27343 > a96-16-108-73.deploy.static.akamaitechnologies.com.http: Flags [.], ack 760, win 64117, length 0
12:45:09.386234 IP 192.168.4.10.27343 > a96-16-108-73.deploy.static.akamaitechnologies.com.http: Flags [.], ack 761, win 64117, length 0
12:45:09.420198 IP wq-in-f189.1e100.net.https > 192.168.4.10.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
12:45:09.978022 IP 192.168.4.10.27343 > a96-16-108-73.deploy.static.akamaitechnologies.com.http: Flags [F.], seq 124, ack 761, win 64117, length 0
12:45:10.058337 IP a96-16-108-73.deploy.static.akamaitechnologies.com.http > 192.168.4.10.27343: Flags [.], ack 125, win 229, length 0
12:45:10.978978 MS NLB heartbeat, host priority: 1292769074, cluster IP: 113.60.203.233, host IP: n147-090-000-000.static.online-age.net
12:45:12.457506 IP par21s03-in-f132.1e100.net.https > 192.168.4.10.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
12:45:12.694057 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
12:45:12.980994 MS NLB heartbeat, host priority: 1275992114, cluster IP: 113.60.203.233, host IP: n147-090-000-000.static.online-age.net
12:45:13.891149 IP wq-in-f189.1e100.net.https > 192.168.4.10.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
12:45:14.983070 MS NLB heartbeat, host priority: 1259215154, cluster IP: 113.60.203.233, host IP: n147-090-000-000.static.online-age.net
12:45:15.530013 IP fra02-006.ff.avast.com.http > 192.168.4.10.49337: Flags [P.], seq 0:154, ack 1, win 1, length 154: HTTP: HTTP/1.1 200 OK
12:45:16.985037 MS NLB heartbeat, host priority: 1242438194, cluster IP: 113.60.203.233, host IP: n147-090-000-000.static.online-age.net
12:45:17.467020 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
12:45:17.467315 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
12:45:17.577701 IP 10.8.0.1.http > 192.168.4.10.49333: Flags [F.], seq 0, ack 1, win 354, length 0
12:45:18.987089 MS NLB heartbeat, host priority: 1225661234, cluster IP: 113.60.203.233, host IP: n147-090-000-000.static.online-age.net
12:45:20.989217 MS NLB heartbeat, host priority: 1208884274, cluster IP: 113.60.203.233, host IP: n147-090-000-000.static.online-age.net
12:45:21.059585 IP par21s03-in-f132.1e100.net.https > 192.168.4.10.49330: Flags [FP.], seq 0:55, ack 1, win 248, length 55
12:45:22.289294 IP 192.0.73.2.https > 192.168.4.10.49335: Flags [P.], seq 0:39, ack 1, win 62, length 39
12:45:22.902185 IP wq-in-f189.1e100.net.https > 192.168.4.10.49332: Flags [FP.], seq 0:56, ack 1, win 253, length 56
12:45:22.991146 MS NLB heartbeat, host priority: 1192107314, cluster IP: 113.60.203.233, host IP: n147-090-000-000.static.online-age.net

0917725929
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
> 0917725929
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
-
Encore dsl pour le 3ème post.

Et après avoir ajouté
iptables -A FORWARD -i tun0 -o ens3 -j ACCEPT
sur le VPS, le tcpdump -i tun0 sur le VPS me donne:

14:37:10.674648 IP 2.20.37.40.443 > 10.8.0.6.49508: Flags [P.], seq 2367719632:2367719655, ack 1460596315, win 322, length 23
14:37:10.674667 IP 2.20.37.40.443 > 10.8.0.6.49508: Flags [F.], seq 23, ack 1, win 322, length 0
14:37:10.949116 IP 2.20.37.40.443 > 10.8.0.6.49508: Flags [P.], seq 0:23, ack 1, win 322, length 23
14:37:11.229089 IP 2.20.37.40.443 > 10.8.0.6.49508: Flags [P.], seq 0:23, ack 1, win 322, length 23
14:37:11.573160 IP 2.20.37.40.443 > 10.8.0.6.49508: Flags [P.], seq 0:23, ack 1, win 322, length 23
14:37:11.989326 IP 2.20.37.40.443 > 10.8.0.6.49508: Flags [P.], seq 0:23, ack 1, win 322, length 23
14:37:12.684204 IP 2.20.37.40.443 > 10.8.0.6.49508: Flags [P.], seq 0:23, ack 1, win 322, length 23
14:37:14.090795 IP 10.8.0.6 > 2.20.37.40: ICMP host 10.8.0.6 unreachable, length 71
14:37:14.090864 IP 10.8.0.6 > 2.20.37.40: ICMP host 10.8.0.6 unreachable, length 48
14:37:14.090897 IP 10.8.0.6 > 2.20.37.40: ICMP host 10.8.0.6 unreachable, length 71
14:37:14.090924 IP 10.8.0.6 > 2.20.37.40: ICMP host 10.8.0.6 unreachable, length 71
14:37:14.090959 IP 10.8.0.6 > 2.20.37.40: ICMP host 10.8.0.6 unreachable, length 71
14:37:14.090985 IP 10.8.0.6 > 2.20.37.40: ICMP host 10.8.0.6 unreachable, length 71
14:37:14.276227 IP 2.20.37.40.443 > 10.8.0.6.49508: Flags [P.], seq 0:23, ack 1, win 322, length 23
14:37:17.590649 IP 10.8.0.6 > 2.20.37.40: ICMP host 10.8.0.6 unreachable, length 71
14:37:18.380156 IP 2.20.37.40.443 > 10.8.0.6.49508: Flags [P.], seq 0:23, ack 1, win 322, length 23
14:37:21.610212 IP 10.8.0.6 > 2.20.37.40: ICMP host 10.8.0.6 unreachable, length 71
14:37:29.389202 IP 2.20.37.40.443 > 10.8.0.6.49508: Flags [P.], seq 0:23, ack 1, win 322, length 23
14:37:42.910589 IP 10.8.0.6.1256 > 8.8.8.8.53: 3100+ A? XEAS.XBOXLIVE.COM. (35)
14:37:42.924648 IP 8.8.8.8.53 > 10.8.0.6.1256: 3100 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
14:37:42.990417 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:37:43.133653 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:37:43.330327 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:37:43.475532 IP 65.55.42.42.88 > 10.8.0.6.1257: v5
14:37:43.683811 IP 10.8.0.6.1256 > 8.8.8.8.53: 3104+ A? XETGS.XBOXLIVE.COM. (36)
14:37:43.697244 IP 8.8.8.8.53 > 10.8.0.6.1256: 3104 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
14:37:43.790473 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:37:43.935988 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:37:44.290233 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:37:44.433946 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:38:12.855816 IP 10.8.0.6.1256 > 8.8.8.8.53: 3118+ A? XEAS.XBOXLIVE.COM. (35)
14:38:12.956823 IP 8.8.8.8.53 > 10.8.0.6.1256: 3118 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
14:38:13.016057 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:38:13.159263 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:38:13.435962 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:38:13.580741 IP 65.55.42.42.88 > 10.8.0.6.1257: v5
14:38:13.908480 IP 10.8.0.6.1256 > 8.8.8.8.53: 3122+ A? XETGS.XBOXLIVE.COM. (36)
14:38:14.009490 IP 8.8.8.8.53 > 10.8.0.6.1256: 3122 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
14:38:14.255828 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:38:14.401278 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:38:14.815972 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:38:14.959506 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:38:35.897397 IP 10.8.0.6.1256 > 8.8.8.8.53: 3136+ A? XEAS.XBOXLIVE.COM. (35)
14:38:35.905589 IP 8.8.8.8.53 > 10.8.0.6.1256: 3136 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
14:38:35.998528 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:38:36.141666 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:38:36.377564 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:38:36.522967 IP 65.55.42.42.88 > 10.8.0.6.1257: v5
14:38:36.838455 IP 10.8.0.6.1256 > 8.8.8.8.53: 3140+ A? XETGS.XBOXLIVE.COM. (36)
14:38:36.846582 IP 8.8.8.8.53 > 10.8.0.6.1256: 3140 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
14:38:36.918187 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:38:37.064344 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:38:37.337397 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:38:37.480964 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:38:54.767867 IP 10.8.0.6.1256 > 8.8.8.8.53: 3153+ A? PIFLC.XBOXLIVE.COM. (36)
14:38:54.781462 IP 8.8.8.8.53 > 10.8.0.6.1256: 3153 2/0/0 CNAME piflc.xlive.trafficmanager.net., A 40.90.217.196 (96)
14:38:54.869268 IP 10.8.0.6.54166 > 40.90.217.196.80: Flags [S], seq 483475036, win 17212, options [mss 1273,nop,wscale 0,nop,nop,sackOK], length 0
14:38:55.013066 IP 40.90.217.196.80 > 10.8.0.6.54166: Flags [S.], seq 2815353642, ack 483475037, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
14:38:55.107795 IP 10.8.0.6.54166 > 40.90.217.196.80: Flags [.], ack 1, win 17212, length 0
14:38:55.114614 IP 10.8.0.6.54166 > 40.90.217.196.80: Flags [P.], seq 1:857, ack 1, win 17212, length 856: HTTP: POST /vortex/logbinary.ashx HTTP/1.0
14:38:55.263272 IP 40.90.217.196.80 > 10.8.0.6.54166: Flags [FP.], seq 1:183, ack 857, win 1024, length 182: HTTP: HTTP/1.1 200 OK
14:38:55.347446 IP 10.8.0.6.54166 > 40.90.217.196.80: Flags [.], ack 184, win 17030, length 0
14:38:55.347523 IP 10.8.0.6.54166 > 40.90.217.196.80: Flags [F.], seq 857, ack 184, win 17030, length 0
14:38:55.490871 IP 40.90.217.196.80 > 10.8.0.6.54166: Flags [.], ack 858, win 1024, length 0
14:38:57.974331 IP 10.8.0.6.1256 > 8.8.8.8.53: 3161+ A? XEAS.XBOXLIVE.COM. (35)
14:38:58.185024 IP 8.8.8.8.53 > 10.8.0.6.1256: 3161 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
14:38:58.494259 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:38:58.637550 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:38:58.894230 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:38:59.040529 IP 65.55.42.42.88 > 10.8.0.6.1257: v5
14:38:59.327212 IP 10.8.0.6.1256 > 8.8.8.8.53: 3165+ A? XETGS.XBOXLIVE.COM. (36)
14:38:59.428614 IP 8.8.8.8.53 > 10.8.0.6.1256: 3165 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
14:38:59.515003 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:38:59.660542 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:39:00.054461 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:39:00.198150 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:39:21.848406 IP 10.8.0.6.1256 > 8.8.8.8.53: 3179+ A? XEAS.XBOXLIVE.COM. (35)
14:39:21.861949 IP 8.8.8.8.53 > 10.8.0.6.1256: 3179 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
14:39:21.954312 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:39:22.097423 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:39:22.154525 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:39:22.299848 IP 65.55.42.42.88 > 10.8.0.6.1257: v5
14:39:22.487376 IP 10.8.0.6.1256 > 8.8.8.8.53: 3183+ A? XETGS.XBOXLIVE.COM. (36)
14:39:22.495601 IP 8.8.8.8.53 > 10.8.0.6.1256: 3183 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
14:39:22.594441 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:39:22.740310 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:39:23.014673 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:39:23.158224 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:39:47.754366 IP 10.8.0.6.1256 > 8.8.8.8.53: 3197+ A? PIFLC.XBOXLIVE.COM. (36)
14:39:47.768002 IP 8.8.8.8.53 > 10.8.0.6.1256: 3197 2/0/0 CNAME piflc.xlive.trafficmanager.net., A 40.90.217.196 (96)
14:39:47.827608 IP 10.8.0.6.16914 > 40.90.217.196.80: Flags [S], seq 3123744889, win 17212, options [mss 1273,nop,wscale 0,nop,nop,sackOK], length 0
14:39:47.977322 IP 40.90.217.196.80 > 10.8.0.6.16914: Flags [S.], seq 3667799429, ack 3123744890, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
14:39:48.147598 IP 10.8.0.6.1256 > 8.8.8.8.53: 3200+ A? XEAS.XBOXLIVE.COM. (35)
14:39:48.147691 IP 10.8.0.6.16914 > 40.90.217.196.80: Flags [.], ack 1, win 17212, length 0
14:39:48.155538 IP 10.8.0.6.16914 > 40.90.217.196.80: Flags [P.], seq 1:847, ack 1, win 17212, length 846: HTTP: POST /vortex/logbinary.ashx HTTP/1.0
14:39:48.161437 IP 8.8.8.8.53 > 10.8.0.6.1256: 3200 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
14:39:48.235333 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:39:48.309933 IP 40.90.217.196.80 > 10.8.0.6.16914: Flags [FP.], seq 1:183, ack 847, win 1024, length 182: HTTP: HTTP/1.1 200 OK
14:39:48.378537 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:39:48.447465 IP 10.8.0.6.16914 > 40.90.217.196.80: Flags [.], ack 184, win 17030, length 0
14:39:48.454921 IP 10.8.0.6.1257 > 65.55.42.42.88: v5
14:39:48.455031 IP 10.8.0.6.16914 > 40.90.217.196.80: Flags [F.], seq 847, ack 184, win 17030, length 0
14:39:48.600303 IP 65.55.42.42.88 > 10.8.0.6.1257: v5
14:39:48.604364 IP 40.90.217.196.80 > 10.8.0.6.16914: Flags [.], ack 848, win 1024, length 0
14:39:49.027712 IP 10.8.0.6.1256 > 8.8.8.8.53: 3208+ A? XETGS.XBOXLIVE.COM. (36)
14:39:49.127725 IP 8.8.8.8.53 > 10.8.0.6.1256: 3208 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
14:39:49.274434 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:39:49.420216 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:39:49.654484 IP 10.8.0.6.1257 > 65.55.42.42.88:
14:39:49.798153 IP 65.55.42.42.88 > 10.8.0.6.1257:
14:40:15.555661 IP 10.8.0.6.1256 > 8.8.8.8.53: 3226+ A? XEXDS.XBOXLIVE.COM. (36)
14:40:15.674490 IP 8.8.8.8.53 > 10.8.0.6.1256: 3226 2/0/0 CNAME xexds.gtm.XBOXLIVE.COM., A 65.55.42.20 (76)
14:40:15.887723 IP 10.8.0.6.1256 > 8.8.8.8.53: 3234+ A? www.msftncsi.com. (34)
14:40:15.895831 IP 8.8.8.8.53 > 10.8.0.6.1256: 3234 4/0/0 CNAME www.msftncsi.com.edgesuite.net., CNAME a1961.g2.akamai.net., A 173.223.11.9, A 173.223.11.48 (140)
14:40:15.947590 IP 10.8.0.6.1256 > 8.8.8.8.53: 3236+ A? www.msftncsi.com. (34)
14:40:15.955690 IP 8.8.8.8.53 > 10.8.0.6.1256: 3236 4/0/0 CNAME www.msftncsi.com.edgesuite.net., CNAME a1961.g2.akamai.net., A 173.223.11.9, A 173.223.11.48 (140)
14:40:16.027869 IP 10.8.0.6.27150 > 173.223.11.9.80: Flags [S], seq 234592539, win 17212, options [mss 1273,nop,wscale 0,nop,nop,sackOK], length 0
14:40:16.035862 IP 173.223.11.9.80 > 10.8.0.6.27150: Flags [S.], seq 2175267909, ack 234592540, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
14:40:16.107746 IP 10.8.0.6.27150 > 173.223.11.9.80: Flags [.], ack 1, win 17212, length 0
14:40:16.114589 IP 10.8.0.6.27150 > 173.223.11.9.80: Flags [P.], seq 1:141, ack 1, win 17212, length 140: HTTP: GET /ncsi.txt HTTP/1.1
14:40:16.122721 IP 173.223.11.9.80 > 10.8.0.6.27150: Flags [.], ack 141, win 237, length 0
14:40:16.123091 IP 173.223.11.9.80 > 10.8.0.6.27150: Flags [P.], seq 1:185, ack 141, win 237, length 184: HTTP: HTTP/1.1 200 OK
14:40:16.187775 IP 10.8.0.6.27150 > 173.223.11.9.80: Flags [.], ack 185, win 17028, length 0
14:40:16.187816 IP 10.8.0.6.27150 > 173.223.11.9.80: Flags [F.], seq 141, ack 185, win 17028, length 0
14:40:16.195871 IP 173.223.11.9.80 > 10.8.0.6.27150: Flags [F.], seq 185, ack 142, win 237, length 0
14:40:16.267832 IP 10.8.0.6.27150 > 173.223.11.9.80: Flags [.], ack 186, win 17028, length 0
14:40:25.874728 IP 10.8.0.6.1256 > 8.8.8.8.53: 3259+ A? xncsi.xboxlive.com. (36)
14:40:25.920070 IP 8.8.8.8.53 > 10.8.0.6.1256: 3259 2/0/0 CNAME xncsi.xboxlive.com.akadns.net., A 52.142.89.40 (95)
14:40:26.027521 IP 10.8.0.6.30649 > 52.142.89.40.80: Flags [S], seq 732919862, win 64876, options [mss 1273,nop,wscale 0,nop,nop,sackOK], length 0
14:40:26.046383 IP 52.142.89.40.80 > 10.8.0.6.30649: Flags [S.], seq 2238073604, ack 732919863, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
14:40:26.107441 IP 10.8.0.6.30649 > 52.142.89.40.80: Flags [.], ack 1, win 64876, length 0
14:40:26.115855 IP 10.8.0.6.30649 > 52.142.89.40.80: Flags [P.], seq 1:97, ack 1, win 64876, length 96: HTTP: GET /XBOXNCSI.txt HTTP/1.0
14:40:26.134617 IP 52.142.89.40.80 > 10.8.0.6.30649: Flags [FP.], seq 1:249, ack 97, win 1024, length 248: HTTP: HTTP/1.1 200 OK
14:40:26.187837 IP 10.8.0.6.30649 > 52.142.89.40.80: Flags [.], ack 250, win 64628, length 0
14:40:26.327685 IP 10.8.0.6.30649 > 52.142.89.40.80: Flags [F.], seq 97, ack 250, win 64628, length 0
14:40:26.327813 IP 10.8.0.6.1256 > 8.8.8.8.53: 3266+ A? notice.xbox.com. (33)
14:40:26.345893 IP 52.142.89.40.80 > 10.8.0.6.30649: Flags [.], ack 98, win 1024, length 0
14:40:26.364983 IP 8.8.8.8.53 > 10.8.0.6.1256: 3266 4/0/0 CNAME notice.xbox.com.nsatc.net., CNAME wildcard.xbox.com.edgekey.net., CNAME e1822.dspb.akamaiedge.net., A 2.16.56.151 (164)
14:40:33.334498 IP 10.8.0.6.1256 > 8.8.8.8.53: 3268+ A? PIFLC.XBOXLIVE.COM. (36)
14:40:33.369337 IP 8.8.8.8.53 > 10.8.0.6.1256: 3268 2/0/0 CNAME piflc.xlive.trafficmanager.net., A 40.90.217.196 (96)
14:40:33.427445 IP 10.8.0.6.22624 > 40.90.217.196.80: Flags [S], seq 1102206739, win 17212, options [mss 1273,nop,wscale 0,nop,nop,sackOK], length 0
14:40:33.571065 IP 40.90.217.196.80 > 10.8.0.6.22624: Flags [S.], seq 2232076787, ack 1102206740, win 8192, options [mss 1440,nop,wscale 8,nop,nop,sackOK], length 0
14:40:33.627544 IP 10.8.0.6.22624 > 40.90.217.196.80: Flags [.], ack 1, win 17212, length 0
14:40:33.634550 IP 10.8.0.6.22624 > 40.90.217.196.80: Flags [P.], seq 1:1024, ack 1, win 17212, length 1023: HTTP: POST /vortex/logbinary.ashx HTTP/1.0
14:40:33.783488 IP 40.90.217.196.80 > 10.8.0.6.22624: Flags [FP.], seq 1:183, ack 1024, win 1024, length 182: HTTP: HTTP/1.1 200 OK
14:40:33.907230 IP 10.8.0.6.22624 > 40.90.217.196.80: Flags [.], ack 184, win 17030, length 0
14:40:33.907718 IP 10.8.0.6.22624 > 40.90.217.196.80: Flags [F.], seq 1024, ack 184, win 17030, length 0
14:40:34.051130 IP 40.90.217.196.80 > 10.8.0.6.22624: Flags [.], ack 1025, win 1024, length 0



et simultanément avec tcpdump - eth0 sur le pi, j'ai:

13:37:17.587089 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:37:17.637075 IP6 :: > ff02::1:ff61:e5ae: ICMP6, neighbor solicitation, who has fe80::5901:2711:ab61:e5ae, length 32
13:37:17.747243 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
13:37:18.067068 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:37:18.408406 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
13:37:18.667194 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:37:18.672587 IP6 fe80::5901:2711:ab61:e5ae > ip6-allrouters: ICMP6, router solicitation, length 16
13:37:18.697048 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:37:18.943694 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:18.944108 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:18.944729 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 1/0/0 (Cache flush) A 192.168.4.250 (45)
13:37:19.193792 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:19.194111 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:19.237041 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:37:19.444715 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:19.445049 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:19.445672 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 1/0/0 (Cache flush) A 192.168.4.250 (45)
13:37:19.467024 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
13:37:19.644854 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
13:37:19.645202 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
13:37:19.707043 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 2 group record(s), length 48
13:37:20.507022 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
13:37:20.870675 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
13:37:20.870994 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
13:37:20.876024 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
13:37:23.737079 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:37:24.327077 IP6 :: > ff02::1:ff61:e5ae: ICMP6, neighbor solicitation, who has fe80::5901:2711:ab61:e5ae, length 32
13:37:24.407254 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
13:37:24.667072 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:37:25.387154 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:37:25.388069 IP6 fe80::5901:2711:ab61:e5ae > ip6-allrouters: ICMP6, router solicitation, length 16
13:37:25.417079 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:37:25.517023 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
13:37:25.663685 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:25.664073 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:25.664699 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 1/0/0 (Cache flush) A 192.168.4.250 (45)
13:37:25.913760 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:25.914076 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:26.164546 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:26.164863 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? e.a.5.e.1.6.b.a.1.1.7.2.1.0.9.5.0.0.0.0.0.0.0.0.0.0.0.0.0.8.e.f.ip6.arpa. ANY (QM)? raspberrypi.local. (155)
13:37:26.165448 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 1/0/0 (Cache flush) A 192.168.4.250 (45)
13:37:26.365514 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
13:37:26.365813 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
13:37:26.427041 IP6 fe80::5901:2711:ab61:e5ae > ff02::16: HBH ICMP6, multicast listener report v2, 2 group record(s), length 48
13:37:27.591327 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
13:37:27.591676 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
13:37:28.133067 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
13:37:29.390482 IP6 fe80::5901:2711:ab61:e5ae > ip6-allrouters: ICMP6, router solicitation, length 16
13:37:29.447109 ARP, Request who-has 169.254.169.44 tell 0.0.0.0, length 28
13:37:29.568136 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
13:37:29.816588 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
13:37:29.816951 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (143)
13:37:29.889212 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
13:37:29.889358 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
13:37:30.587021 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
13:37:30.889604 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
13:37:30.889750 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
13:37:30.996472 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
13:37:30.996517 IP a2-20-37-40.deploy.static.akamaitechnologies.com.https > 192.168.4.10.49508: Flags [P.], seq 2367719632:2367719655, ack 1460596315, win 322, length 23
13:37:31.087811 ARP, Request who-has 169.254.169.44 tell 0.0.0.0, length 28
13:37:31.380865 IP 192.168.4.10 > igmp.mcast.net: igmp v3 report, 1 group record(s)
13:37:31.442660 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 335
13:37:31.473401 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 391
13:37:31.535404 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 344
13:37:31.628415 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 389
13:37:31.752440 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 401
13:37:31.906411 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 399
13:37:32.061395 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 335
13:37:32.246407 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 391
13:37:32.462409 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 344
13:37:32.589432 ARP, Request who-has 169.254.169.44 tell 0.0.0.0, length 28
13:37:32.711705 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 389
13:37:32.891933 IP6 fe80::5901:2711:ab61:e5ae.mdns > ff02::fb.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
13:37:32.892083 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 PTR (QM)? 44.169.254.169.in-addr.arpa. (45)
13:37:32.897397 ARP, Request who-has 192.168.4.250 tell 192.168.4.10, length 46
13:37:32.897431 ARP, Reply 192.168.4.250 is-at b8:27:eb:76:6c:d5 (oui Unknown), length 28
13:37:32.897822 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:37:32.897945 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:37:32.989446 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 401
13:37:33.268415 IP 192.168.4.10.47936 > 239.255.255.250.1900: UDP, length 399
13:37:33.391129 IP6 fe80::5901:2711:ab61:e5ae > ip6-allrouters: ICMP6, router solicitation, length 16
13:37:34.591826 ARP, Request who-has 169.254.169.44 tell 169.254.169.44, length 28
13:37:34.817619 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:37:34.817750 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:37:34.868528 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? 44.169.254.169.in-addr.arpa. ANY (QM)? raspberrypi.local. (98)
13:37:34.868931 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) A 192.168.4.250, (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (73)
13:37:35.118967 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? 44.169.254.169.in-addr.arpa. ANY (QM)? raspberrypi.local. (98)
13:37:35.370007 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0 [2q] [2n] ANY (QM)? 44.169.254.169.in-addr.arpa. ANY (QM)? raspberrypi.local. (98)
13:37:35.370336 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) A 192.168.4.250, (Cache flush) AAAA fe80::5901:2711:ab61:e5ae (73)
13:37:35.570169 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 2/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) A 169.254.169.44 (86)
13:37:36.027021 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
13:37:36.027295 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
13:37:36.538141 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
13:37:36.592287 ARP, Request who-has 169.254.169.44 tell 169.254.169.44, length 28
13:37:36.795298 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 3/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) A 169.254.169.44, (Cache flush) A 192.168.4.250 (102)
13:37:36.827612 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:37:36.827723 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:37:37.392243 IP6 fe80::5901:2711:ab61:e5ae > ip6-allrouters: ICMP6, router solicitation, length 16
13:37:38.837652 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:37:38.837813 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:37:39.022374 IP 192.168.4.250.mdns > 224.0.0.251.mdns: 0*- [0q] 3/0/0 (Cache flush) PTR raspberrypi.local., (Cache flush) A 169.254.169.44, (Cache flush) A 192.168.4.250 (102)
13:37:40.845636 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:37:40.845754 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:37:42.853053 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3100+ A? XEAS.XBOXLIVE.COM. (35)
13:37:42.958913 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3100 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
13:37:42.969932 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:37:43.288979 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:37:43.303583 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:37:43.519290 IP 65.55.42.42.kerberos > 192.168.4.10.1257: v5
13:37:43.670541 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3104+ A? XETGS.XBOXLIVE.COM. (36)
13:37:43.758806 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3104 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
13:37:43.770891 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:37:44.108625 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:37:44.255153 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:37:44.518021 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:37:44.655594 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:37:44.655675 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:37:46.661625 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:37:46.661702 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:37:48.669646 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:37:48.669716 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:37:50.679634 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:37:50.679744 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:37:52.161373 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
13:37:52.689623 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:37:52.689672 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:02.857614 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:02.857765 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:04.736713 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:04.736781 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:06.745705 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:06.745759 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:08.754709 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:08.754745 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:10.760723 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:10.760756 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:11.787019 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
13:38:11.787256 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
13:38:12.783051 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3118+ A? XEAS.XBOXLIVE.COM. (35)
13:38:12.984819 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3118 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
13:38:13.000058 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:38:13.394497 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:38:13.400464 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:38:13.804459 IP 65.55.42.42.kerberos > 192.168.4.10.1257: v5
13:38:13.867453 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3122+ A? XETGS.XBOXLIVE.COM. (36)
13:38:14.213668 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3122 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
13:38:14.218093 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:38:14.632245 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:38:14.785363 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:38:15.033408 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:38:15.169475 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:15.169511 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:16.981743 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:16.981787 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:18.991758 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:18.991801 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:20.999755 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:20.999794 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:23.008792 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:23.008844 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:24.721405 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
13:38:25.896747 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:25.896804 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:27.829783 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:27.829819 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:29.839778 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:29.839822 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:31.845801 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:31.845840 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:33.847799 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:33.847841 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:35.856216 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3136+ A? XEAS.XBOXLIVE.COM. (35)
13:38:35.965463 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3136 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
13:38:35.973079 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:38:36.331645 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:38:36.340134 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:38:36.741787 IP 65.55.42.42.kerberos > 192.168.4.10.1257: v5
13:38:36.807441 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3140+ A? XETGS.XBOXLIVE.COM. (36)
13:38:36.886375 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3140 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
13:38:36.890843 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:38:37.151248 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:38:37.291689 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:38:37.557074 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:38:37.692003 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:37.692040 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:39.665830 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:39.665871 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:41.672831 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:41.672868 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:43.674832 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:43.674872 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:45.676843 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:45.676892 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:48.018651 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:48.018688 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:49.883869 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:49.883923 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:51.892861 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:51.892896 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:53.901890 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:53.901944 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:54.741860 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3153+ A? PIFLC.XBOXLIVE.COM. (36)
13:38:54.842352 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3153 2/0/0 CNAME piflc.xlive.trafficmanager.net., A 40.90.217.196 (96)
13:38:54.858613 IP 192.168.4.10.54166 > 40.90.217.196.http: Flags [S], seq 483475036, win 17212, options [mss 1324,nop,wscale 0,nop,nop,sackOK], length 0
13:38:55.080876 IP 40.90.217.196.http > 192.168.4.10.54166: Flags [S.], seq 2815353642, ack 483475037, win 8192, options [mss 1273,nop,wscale 8,nop,nop,sackOK], length 0
13:38:55.081088 IP 192.168.4.10.54166 > 40.90.217.196.http: Flags [.], ack 1, win 17212, length 0
13:38:55.092224 IP 192.168.4.10.54166 > 40.90.217.196.http: Flags [P.], seq 1:857, ack 1, win 17212, length 856: HTTP: POST /vortex/logbinary.ashx HTTP/1.0
13:38:55.322287 IP 40.90.217.196.http > 192.168.4.10.54166: Flags [FP.], seq 1:183, ack 857, win 1024, length 182: HTTP: HTTP/1.1 200 OK
13:38:55.322509 IP 192.168.4.10.54166 > 40.90.217.196.http: Flags [.], ack 184, win 17030, length 0
13:38:55.325730 IP 192.168.4.10.54166 > 40.90.217.196.http: Flags [F.], seq 857, ack 184, win 17030, length 0
13:38:55.578603 IP 40.90.217.196.http > 192.168.4.10.54166: Flags [.], ack 858, win 1024, length 0
13:38:55.903899 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:38:55.903940 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:38:57.911631 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3161+ A? XEAS.XBOXLIVE.COM. (35)
13:38:58.450078 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3161 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
13:38:58.462300 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:38:58.843445 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:38:58.846005 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:38:59.269353 IP 65.55.42.42.kerberos > 192.168.4.10.1257: v5
13:38:59.313706 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3165+ A? XETGS.XBOXLIVE.COM. (36)
13:38:59.482201 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3165 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
13:38:59.496847 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:38:59.867012 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
13:38:59.867255 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
13:38:59.884296 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:39:00.031315 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:39:00.293558 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:39:00.431707 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:00.431751 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:02.327930 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:02.327999 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:04.337919 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:04.337965 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:06.346926 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:06.346963 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:08.349930 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:08.349970 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:11.959986 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:11.960026 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:13.771969 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:13.772009 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:15.780969 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:15.781010 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:17.790972 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:17.791009 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:19.794979 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:19.795023 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:21.802256 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3179+ A? XEAS.XBOXLIVE.COM. (35)
13:39:21.930167 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3179 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
13:39:21.935859 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:39:22.124785 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:39:22.136062 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:39:22.411659 IP 65.55.42.42.kerberos > 192.168.4.10.1257: v5
13:39:22.453625 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3183+ A? XETGS.XBOXLIVE.COM. (36)
13:39:22.566144 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3183 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
13:39:22.569978 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:39:22.821508 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:39:22.970940 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:39:23.231025 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:39:23.371458 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:23.371503 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:25.205012 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:25.205068 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:27.215030 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:27.215097 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:28.600275 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
13:39:29.222019 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:29.222074 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:31.231057 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:31.231125 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:38.269081 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:38.269157 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:40.081073 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:40.081120 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:42.083095 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:42.083142 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:44.086072 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:44.086118 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:46.096091 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:46.096136 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:47.147040 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
13:39:47.147263 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
13:39:47.711931 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3197+ A? PIFLC.XBOXLIVE.COM. (36)
13:39:47.801929 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3197 2/0/0 CNAME piflc.xlive.trafficmanager.net., A 40.90.217.196 (96)
13:39:47.811631 IP 192.168.4.10.16914 > 40.90.217.196.http: Flags [S], seq 3123744889, win 17212, options [mss 1324,nop,wscale 0,nop,nop,sackOK], length 0
13:39:48.111982 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3200+ A? XEAS.XBOXLIVE.COM. (35)
13:39:48.124341 IP 40.90.217.196.http > 192.168.4.10.16914: Flags [S.], seq 3667799429, ack 3123744890, win 8192, options [mss 1273,nop,wscale 8,nop,nop,sackOK], length 0
13:39:48.124525 IP 192.168.4.10.16914 > 40.90.217.196.http: Flags [.], ack 1, win 17212, length 0
13:39:48.128739 IP 192.168.4.10.16914 > 40.90.217.196.http: Flags [P.], seq 1:847, ack 1, win 17212, length 846: HTTP: POST /vortex/logbinary.ashx HTTP/1.0
13:39:48.201812 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3200 2/0/0 CNAME xeas.gtm.XBOXLIVE.COM., A 65.55.42.42 (74)
13:39:48.212161 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:39:48.421229 IP 40.90.217.196.http > 192.168.4.10.16914: Flags [FP.], seq 1:183, ack 847, win 1024, length 182: HTTP: HTTP/1.1 200 OK
13:39:48.421378 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:39:48.421472 IP 192.168.4.10.16914 > 40.90.217.196.http: Flags [.], ack 184, win 17030, length 0
13:39:48.429106 IP 192.168.4.10.1257 > 65.55.42.42.kerberos: v5
13:39:48.429162 IP 192.168.4.10.16914 > 40.90.217.196.http: Flags [F.], seq 847, ack 184, win 17030, length 0
13:39:48.830844 IP 65.55.42.42.kerberos > 192.168.4.10.1257: v5
13:39:48.830988 IP 40.90.217.196.http > 192.168.4.10.16914: Flags [.], ack 848, win 1024, length 0
13:39:48.996192 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3208+ A? XETGS.XBOXLIVE.COM. (36)
13:39:49.240261 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3208 2/0/0 CNAME xetgs.gtm.XBOXLIVE.COM., A 65.55.42.42 (76)
13:39:49.246722 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:39:49.447395 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:39:49.597419 IP 192.168.4.10.1257 > 65.55.42.42.kerberos:
13:39:50.059616 IP 65.55.42.42.kerberos > 192.168.4.10.1257:
13:39:50.197964 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:50.198002 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:52.122091 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:52.122126 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:54.132098 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:54.132138 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:56.142113 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:56.142164 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:39:58.152133 IP 192.168.4.10.3074 > as.prod.xboxlive.com.3074: UDP, length 1336
13:39:58.152169 IP 192.168.4.10.3074 > 192.168.4.10.3074: UDP, length 1336
13:40:00.486746 MS NLB heartbeat, host priority: 779721651, cluster IP: 193.182.20.224, host IP: 21.233.192.120
13:40:02.527544 MS NLB heartbeat, host priority: 762944691, cluster IP: 193.182.20.224, host IP: 21.233.192.120
13:40:04.529636 MS NLB heartbeat, host priority: 746167731, cluster IP: 193.182.20.224, host IP: 21.233.192.120
13:40:06.531638 MS NLB heartbeat, host priority: 729390771, cluster IP: 193.182.20.224, host IP: 21.233.192.120
13:40:10.269861 MS NLB heartbeat, host priority: 4280225094, cluster IP: 18.198.42.60, host IP: 253.177.9.120
13:40:10.269955 MS NLB heartbeat, host priority: 794878137, cluster IP: 210-157-012-211.marugoto-server.com, host IP: 204.200.58.100
13:40:10.317581 IP 0.0.0.0 > igmp.mcast.net: igmp v3 report, 1 group record(s)
13:40:10.317677 IP 0.0.0.0.47936 > 239.255.255.250.1900: UDP, length 190
13:40:10.317844 IP 0.0.0.0.47936 > 239.255.255.250.1900: UDP, length 246
13:40:10.317865 IP 0.0.0.0.47936 > 239.255.255.250.1900: UDP, length 199
13:40:10.317886 IP 0.0.0.0.47936 > 239.255.255.250.1900: UDP, length 244
13:40:10.317904 IP 0.0.0.0.47936 > 239.255.255.250.1900: UDP, length 256
13:40:10.317921 IP 0.0.0.0.47936 > 239.255.255.250.1900: UDP, length 254
13:40:10.405904 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
13:40:11.410936 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
13:40:12.287307 MS NLB heartbeat, host priority: 778101177, cluster IP: 210-157-012-211.marugoto-server.com, host IP: 204.200.58.100
13:40:12.413912 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
13:40:13.414922 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
13:40:14.415924 ARP, Request who-has 192.168.4.10 tell 192.168.4.10, length 46
13:40:15.416933 ARP, Request who-has 192.168.4.250 tell 192.168.4.10, length 46
13:40:15.416975 ARP, Reply 192.168.4.250 is-at b8:27:eb:76:6c:d5 (oui Unknown), length 28
13:40:15.417158 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46
13:40:15.439409 IP 192.168.4.10 > igmp.mcast.net: igmp v3 report, 1 group record(s)
13:40:15.472816 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 335
13:40:15.490458 ARP, Request who-has 192.168.4.250 tell 192.168.4.10, length 46
13:40:15.490478 ARP, Reply 192.168.4.250 is-at b8:27:eb:76:6c:d5 (oui Unknown), length 28
13:40:15.490648 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3226+ A? XEXDS.XBOXLIVE.COM. (36)
13:40:15.506184 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 391
13:40:15.572931 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 344
13:40:15.673037 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 389
13:40:15.721952 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3226 2/0/0 CNAME xexds.gtm.XBOXLIVE.COM., A 65.55.42.20 (76)
13:40:15.791082 IP 192.168.4.10.1258 > 65.55.42.20.3074: UDP, length 1336
13:40:15.791137 IP 192.168.4.10.1258 > 192.168.4.10.3074: UDP, length 1336
13:40:15.791147 IP 192.168.4.10.1259 > 65.55.42.20.3074: UDP, length 200
13:40:15.791186 IP 192.168.4.10.1259 > 192.168.4.10.3074: UDP, length 200
13:40:15.806540 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 401
13:40:15.856449 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3234+ A? www.msftncsi.com. (34)
13:40:15.922809 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3234 4/0/0 CNAME www.msftncsi.com.edgesuite.net., CNAME a1961.g2.akamai.net., A 173.223.11.9, A 173.223.11.48 (140)
13:40:15.923276 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3236+ A? www.msftncsi.com. (34)
13:40:15.939971 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 399
13:40:16.001657 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3236 4/0/0 CNAME www.msftncsi.com.edgesuite.net., CNAME a1961.g2.akamai.net., A 173.223.11.9, A 173.223.11.48 (140)
13:40:16.006575 IP 192.168.4.10.27150 > a173-223-11-9.deploy.static.akamaitechnologies.com.http: Flags [S], seq 234592539, win 17212, options [mss 1324,nop,wscale 0,nop,nop,sackOK], length 0
13:40:16.081907 IP a173-223-11-9.deploy.static.akamaitechnologies.com.http > 192.168.4.10.27150: Flags [S.], seq 2175267909, ack 234592540, win 29200, options [mss 1273,nop,nop,sackOK,nop,wscale 7], length 0
13:40:16.082122 IP 192.168.4.10.27150 > a173-223-11-9.deploy.static.akamaitechnologies.com.http: Flags [.], ack 1, win 17212, length 0
13:40:16.090078 IP 192.168.4.10.27150 > a173-223-11-9.deploy.static.akamaitechnologies.com.http: Flags [P.], seq 1:141, ack 1, win 17212, length 140: HTTP: GET /ncsi.txt HTTP/1.1
13:40:16.106794 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 335
13:40:16.162616 IP a173-223-11-9.deploy.static.akamaitechnologies.com.http > 192.168.4.10.27150: Flags [.], ack 141, win 237, length 0
13:40:16.162787 IP a173-223-11-9.deploy.static.akamaitechnologies.com.http > 192.168.4.10.27150: Flags [P.], seq 1:185, ack 141, win 237, length 184: HTTP: HTTP/1.1 200 OK
13:40:16.162997 IP 192.168.4.10.27150 > a173-223-11-9.deploy.static.akamaitechnologies.com.http: Flags [.], ack 185, win 17028, length 0
13:40:16.173494 IP 192.168.4.10.27150 > a173-223-11-9.deploy.static.akamaitechnologies.com.http: Flags [F.], seq 141, ack 185, win 17028, length 0
13:40:16.241767 IP a173-223-11-9.deploy.static.akamaitechnologies.com.http > 192.168.4.10.27150: Flags [F.], seq 185, ack 142, win 237, length 0
13:40:16.242004 IP 192.168.4.10.27150 > a173-223-11-9.deploy.static.akamaitechnologies.com.http: Flags [.], ack 186, win 17028, length 0
13:40:16.307011 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 391
13:40:16.507196 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 344
13:40:16.740753 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 389
13:40:17.007716 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 401
13:40:17.308000 IP 192.168.4.10.54980 > 239.255.255.250.1900: UDP, length 399
13:40:17.792961 IP 192.168.4.10.1258 > 65.55.42.20.3074: UDP, length 1336
13:40:17.793015 IP 192.168.4.10.1258 > 192.168.4.10.3074: UDP, length 1336
13:40:17.793025 IP 192.168.4.10.1259 > 65.55.42.20.3074: UDP, length 200
13:40:17.793056 IP 192.168.4.10.1259 > 192.168.4.10.3074: UDP, length 200
13:40:19.794970 IP 192.168.4.10.1258 > 65.55.42.20.3074: UDP, length 1336
13:40:19.795008 IP 192.168.4.10.1258 > 192.168.4.10.3074: UDP, length 1336
13:40:19.795018 IP 192.168.4.10.1259 > 65.55.42.20.3074: UDP, length 200
13:40:19.795047 IP 192.168.4.10.1259 > 192.168.4.10.3074: UDP, length 200
13:40:21.797048 IP 192.168.4.10.1258 > 65.55.42.20.3074: UDP, length 1336
13:40:21.797115 IP 192.168.4.10.1258 > 192.168.4.10.3074: UDP, length 1336
13:40:21.797129 IP 192.168.4.10.1259 > 65.55.42.20.3074: UDP, length 200
13:40:21.797160 IP 192.168.4.10.1259 > 192.168.4.10.3074: UDP, length 200
13:40:23.799041 IP 192.168.4.10.1258 > 65.55.42.20.3074: UDP, length 1336
13:40:23.799081 IP 192.168.4.10.1258 > 192.168.4.10.3074: UDP, length 1336
13:40:23.799091 IP 192.168.4.10.1259 > 65.55.42.20.3074: UDP, length 200
13:40:23.799119 IP 192.168.4.10.1259 > 192.168.4.10.3074: UDP, length 200
13:40:25.800877 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3259+ A? xncsi.xboxlive.com. (36)
13:40:25.961802 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3259 2/0/0 CNAME xncsi.xboxlive.com.akadns.net., A 52.142.89.40 (95)
13:40:26.001020 IP 192.168.4.10.30649 > 52.142.89.40.http: Flags [S], seq 732919862, win 64876, options [mss 1324,nop,wscale 0,nop,nop,sackOK], length 0
13:40:26.081559 IP 52.142.89.40.http > 192.168.4.10.30649: Flags [S.], seq 2238073604, ack 732919863, win 8192, options [mss 1273,nop,wscale 8,nop,nop,sackOK], length 0
13:40:26.081770 IP 192.168.4.10.30649 > 52.142.89.40.http: Flags [.], ack 1, win 64876, length 0
13:40:26.101150 IP 192.168.4.10.30649 > 52.142.89.40.http: Flags [P.], seq 1:97, ack 1, win 64876, length 96: HTTP: GET /XBOXNCSI.txt HTTP/1.0
13:40:26.161698 IP 52.142.89.40.http > 192.168.4.10.30649: Flags [FP.], seq 1:249, ack 97, win 1024, length 248: HTTP: HTTP/1.1 200 OK
13:40:26.161907 IP 192.168.4.10.30649 > 52.142.89.40.http: Flags [.], ack 250, win 64628, length 0
13:40:26.301413 IP 192.168.4.10.30649 > 52.142.89.40.http: Flags [F.], seq 97, ack 250, win 64628, length 0
13:40:26.301609 MS NLB heartbeat, host priority: 2835821979, cluster IP: 208.55.154.41, host IP: 143.101.24.86
13:40:26.301753 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3266+ A? notice.xbox.com. (33)
13:40:26.402312 IP 52.142.89.40.http > 192.168.4.10.30649: Flags [.], ack 98, win 1024, length 0
13:40:26.404085 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3266 4/0/0 CNAME notice.xbox.com.nsatc.net., CNAME wildcard.xbox.com.edgekey.net., CNAME e1822.dspb.akamaiedge.net., A 2.16.56.151 (164)
13:40:31.610278 IP 0.0.0.0.bootpc > 255.255.255.255.bootps: BOOTP/DHCP, Request from b8:27:eb:76:6c:d5 (oui Unknown), length 343
13:40:33.274043 IP 192.168.4.10.1256 > google-public-dns-a.google.com.domain: 3268+ A? PIFLC.XBOXLIVE.COM. (36)
13:40:33.402779 IP google-public-dns-a.google.com.domain > 192.168.4.10.1256: 3268 2/0/0 CNAME piflc.xlive.trafficmanager.net., A 40.90.217.196 (96)
13:40:33.407418 IP 192.168.4.10.22624 > 40.90.217.196.http: Flags [S], seq 1102206739, win 17212, options [mss 1324,nop,wscale 0,nop,nop,sackOK], length 0
13:40:33.601614 IP 40.90.217.196.http > 192.168.4.10.22624: Flags [S.], seq 2232076787, ack 1102206740, win 8192, options [mss 1273,nop,wscale 8,nop,nop,sackOK], length 0
13:40:33.601825 IP 192.168.4.10.22624 > 40.90.217.196.http: Flags [.], ack 1, win 17212, length 0
13:40:33.607772 IP 192.168.4.10.22624 > 40.90.217.196.http: Flags [P.], seq 1:1024, ack 1, win 17212, length 1023: HTTP: POST /vortex/logbinary.ashx HTTP/1.0
13:40:33.886267 IP 40.90.217.196.http > 192.168.4.10.22624: Flags [FP.], seq 1:183, ack 1024, win 1024, length 182: HTTP: HTTP/1.1 200 OK
13:40:33.886487 IP 192.168.4.10.22624 > 40.90.217.196.http: Flags [.], ack 184, win 17030, length 0
13:40:33.891294 IP 192.168.4.10.22624 > 40.90.217.196.http: Flags [F.], seq 1024, ack 184, win 17030, length 0
13:40:34.082679 IP 40.90.217.196.http > 192.168.4.10.22624: Flags [.], ack 1025, win 1024, length 0
13:40:38.427019 ARP, Request who-has 192.168.4.10 tell 192.168.4.250, length 28
13:40:38.427262 ARP, Reply 192.168.4.10 is-at 7c:1e:52:06:6e:78 (oui Unknown), length 46

Commenter la réponse de brupala
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
0
Merci
Oui en effet tu avais raison ! le souci était qu'il fallait préciser, sur le VPS comme sur le Pi, l'interface source concernée par la redirection, sans quoi c'était un vrai bazzard:

VPS:
iptables -t nat -A PREROUTING -i ens3 -p udp -m udp --dport 3074-j DNAT --to-destination 10.8.0.6


PI:
iptables -t nat -A PREROUTING -i tun0 -p udp -m udp --dport 3074-j DNAT --to-destination 192.168.4.10


Avec cette synthaxe ça marche au top, les ports sont redirigés nickel !

Le 3074 suffit pour le NAT ouvert, cependant pour une compatibilité parfaite j'ai suivit les consignes de Microsoft, R* et Portforward.com et j'ai ouvert (sauf le 80, utilisé par mon serveur http sur le vps):

Grand Theft Auto V - Xbox 360
TCP: 3074, 53, 80
UDP: 88, 3074, 53, 500, 3544, 4500, 6672,61455-61458

(source:

https://support.rockstargames.com/fr/articles/200525767/Problemes-de-connexion-avec-GTA-Online
https://support.xbox.com/fr-FR/xbox-360/networking/network-ports-used-xbox-live
https://portforward.com/help/grand-theft-auto-v/
)

Le résultat est génial, avec cette configuration je n'ai plus aucune déconnexion intempestives ! Finit les hotes & sessions injoignables, les hôtes indésignables, les services Rockstar indisponibles ... Je suis à chaque fois dans des sessions bien remplies je peux rejoindre tous le monde, je peux héberger des parties rempli de joueur et tous le monde peux me rejoindre. Et le tout en 4G avec 2 barres. je pense que le MTU ajusté sur mon VPN joue aussi son rôle. En tous cas un bon point pour OVH, maintenant j'ai un VPN spécial gaming et j'en ai profité au passage pour me faire une p'tite seed box pour dl des distrib Linux, le tout pour 3.5 €/mois !

Merci brupala !!
brupala
Messages postés
83613
Date d'inscription
lundi 16 juillet 2001
Statut
Modérateur
Dernière intervention
21 mai 2019
7555 -
:-)
Ce fut un plaisir ...
compliqué, mais un plaisir d'avoir pû aider un peu, car tu as quand même fait 99% du truc.
A enseigner dans les écoles :-)
0917725929
Messages postés
11
Date d'inscription
lundi 22 avril 2019
Statut
Membre
Dernière intervention
28 avril 2019
-
Oui mais ta lecture de mes dumps tcp mon clairement indiqué le chemin :) Oui ce serait un sujet top en TP, J'ai fais un Bac pro SEN option TR il y a ~10 ans et on rigolait bien et ça aurait été motivant comme sujet tout le monde aurait suivit je suis sûr. Encore merci.
Commenter la réponse de 0917725929