HUEBridge device verliert/schließt immer wieder die Verbindung zur deConz Instan

Begonnen von pjakobs, 06 Oktober 2020, 20:40:20

Vorheriges Thema - Nächstes Thema

pjakobs

ja, bei mir passiert das im Container (allerdings nicht docker, sondern podman, das Container Image ist aber das original)
pj

pjakobs

so, ich hab mal ein bisshen analylisert:


2020.10.08 12:45:01 3: deCONZ: closing websocket due to empty message reading from $VAR1 = bless( \*Symbol::GEN771641, 'IO::Socket::INET' );
2020.10.08 12:45:01 2: deCONZ: websocket closed
2020.10.08 12:46:00 3: deCONZ: websocket opened to 192.168.29.5:8443
2020.10.08 12:46:00 3: deCONZ: websocket: Switching Protocols ok
2020.10.08 12:46:01 3: deCONZ: websocket opened to 192.168.29.5:8443
2020.10.08 12:46:02 3: deCONZ: websocket: Switching Protocols ok
2020.10.08 12:46:27 3: deCONZ: closing websocket due to empty message reading from $VAR1 = bless( \*Symbol::GEN772852, 'IO::Socket::INET' );
2020.10.08 12:46:27 2: deCONZ: websocket closed
2020.10.08 12:47:00 3: deCONZ: websocket opened to 192.168.29.5:8443
2020.10.08 12:47:00 3: deCONZ: websocket: Switching Protocols ok


es gibt also zwei Events: um 12:45:01 und um 12:46:27

Was passiert in den Momenten auf dem Netzwerk?

10:45:00.461681 IP (tos 0x0, ttl 51, id 44993, offset 0, flags (DF), proto TCP (6), length 484)
    149.154.167.220.443 > 192.168.29.5.57514: Flags (P.), cksum 0xe152 (correct), seq 6297:6729, ack 882, win 31, options (nop,nop,TS val 1860530869 ecr 3241292543), length 432
10:45:00.461682 IP (tos 0x0, ttl 51, id 44994, offset 0, flags (DF), proto TCP (6), length 76)
    149.154.167.220.443 > 192.168.29.5.57514: Flags (P.), cksum 0x9f34 (correct), seq 6729:6753, ack 882, win 31, options (nop,nop,TS val 1860530869 ecr 3241292543), length 24
10:45:00.461801 IP (tos 0x0, ttl 64, id 31701, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.57514 > 149.154.167.220.443: Flags (.), cksum 0x1b4b (incorrect -> 0xa271), seq 882, ack 6729, win 501, options (nop,nop,TS val 3241322556 ecr 1860530869), length 0
10:45:00.461822 IP (tos 0x0, ttl 64, id 31702, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.57514 > 149.154.167.220.443: Flags (.), cksum 0x1b4b (incorrect -> 0xa259), seq 882, ack 6753, win 501, options (nop,nop,TS val 3241322556 ecr 1860530869), length 0
10:45:00.461936 IP (tos 0x0, ttl 51, id 44995, offset 0, flags (DF), proto TCP (6), length 52)
    149.154.167.220.443 > 192.168.29.5.57514: Flags (F.), cksum 0x196c (correct), seq 6753, ack 882, win 31, options (nop,nop,TS val 1860530869 ecr 3241292543), length 0
10:45:00.495252 IP (tos 0x0, ttl 64, id 32401, offset 0, flags (DF), proto TCP (6), length 60)
    192.168.29.5.39916 > 192.168.29.5.8080: Flags (S), cksum 0xbb89 (incorrect -> 0xaf49), seq 3813333643, win 65495, options (mss 65495,sackOK,TS val 850540378 ecr 0,nop,wscale 7), length 0
10:45:00.495324 IP (tos 0x0, ttl 64, id 0, offset 0, flags (DF), proto TCP (6), length 60)
    192.168.29.5.8080 > 192.168.29.5.39916: Flags (S.), cksum 0xbb89 (incorrect -> 0x8c90), seq 1377134226, ack 3813333644, win 65483, options (mss 65495,sackOK,TS val 850540378 ecr 850540378,nop,wscale 7), length 0
10:45:00.495364 IP (tos 0x0, ttl 64, id 32402, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.39916 > 192.168.29.5.8080: Flags (.), cksum 0xbb81 (incorrect -> 0xb34c), seq 1, ack 1, win 512, options (nop,nop,TS val 850540378 ecr 850540378), length 0
10:45:00.502892 IP (tos 0x0, ttl 64, id 31703, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.57514 > 149.154.167.220.443: Flags (.), cksum 0x1b4b (incorrect -> 0xa22f), seq 882, ack 6754, win 501, options (nop,nop,TS val 3241322597 ecr 1860530869), length 0
10:45:00.825819 IP (tos 0x0, ttl 64, id 31704, offset 0, flags (DF), proto TCP (6), length 76)
    192.168.29.5.57514 > 149.154.167.220.443: Flags (P.), cksum 0x1b63 (incorrect -> 0x3f77), seq 882:906, ack 6754, win 501, options (nop,nop,TS val 3241322920 ecr 1860530869), length 24
10:45:00.835089 IP (tos 0x0, ttl 51, id 0, offset 0, flags (DF), proto TCP (6), length 40)
    149.154.167.220.443 > 192.168.29.5.57514: Flags (R), cksum 0x0fc4 (correct), seq 2370901313, win 0, length 0
10:45:00.864610 IP (tos 0x0, ttl 64, id 59544, offset 0, flags (DF), proto TCP (6), length 60)
    192.168.29.5.58548 > 149.154.167.220.443: Flags (S), cksum 0x1b53 (incorrect -> 0x6303), seq 3112551408, win 64240, options (mss 1460,sackOK,TS val 3241322958 ecr 0,nop,wscale 7), length 0
10:45:00.874292 IP (tos 0x0, ttl 51, id 0, offset 0, flags (DF), proto TCP (6), length 60)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (S.), cksum 0x3564 (correct), seq 2225044203, ack 3112551409, win 28960, options (mss 1460,sackOK,TS val 2658867541 ecr 3241322958,nop,wscale 10), length 0
10:45:00.874344 IP (tos 0x0, ttl 64, id 59545, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.58548 > 149.154.167.220.443: Flags (.), cksum 0x1b4b (incorrect -> 0xd353), seq 1, ack 1, win 502, options (nop,nop,TS val 3241322968 ecr 2658867541), length 0
10:45:01.255592 IP (tos 0x0, ttl 64, id 32403, offset 0, flags (DF), proto TCP (6), length 197)
    192.168.29.5.39916 > 192.168.29.5.8080: Flags (P.), cksum 0xbc12 (incorrect -> 0xd310), seq 1:146, ack 1, win 512, options (nop,nop,TS val 850541138 ecr 850540378), length 145: HTTP, length: 145
GET /api/3706384256/lights HTTP/1.0
Host: 192.168.29.5:8080
User-Agent: fhem
Accept-Encoding: gzip,deflate
--
10:45:01.255665 IP (tos 0x0, ttl 64, id 20100, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8080 > 192.168.29.5.39916: Flags (.), cksum 0xbb81 (incorrect -> 0xaccb), seq 1, ack 146, win 511, options (nop,nop,TS val 850541139 ecr 850541138), length 0
10:45:01.257106 IP (tos 0x0, ttl 64, id 20101, offset 0, flags (DF), proto TCP (6), length 211)
    192.168.29.5.8080 > 192.168.29.5.39916: Flags (P.), cksum 0xbc20 (incorrect -> 0x9145), seq 1:160, ack 146, win 512, options (nop,nop,TS val 850541140 ecr 850541138), length 159: HTTP, length: 159
HTTP/1.1 200 OK
Access-Control-Allow-Origin: *
Content-Type: application/json; charset=utf-8
Content-Length:2
--
10:45:01.257593 IP (tos 0x0, ttl 64, id 32404, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.39916 > 192.168.29.5.8080: Flags (.), cksum 0xbb81 (incorrect -> 0xac29), seq 146, ack 160, win 511, options (nop,nop,TS val 850541140 ecr 850541140), length 0
10:45:01.370713 IP (tos 0x0, ttl 64, id 59546, offset 0, flags (DF), proto TCP (6), length 569)
    192.168.29.5.58548 > 149.154.167.220.443: Flags (P.), cksum 0x1d50 (incorrect -> 0x60d3), seq 1:518, ack 1, win 502, options (nop,nop,TS val 3241323465 ecr 2658867541), length 517
10:45:01.380197 IP (tos 0x0, ttl 51, id 25524, offset 0, flags (DF), proto TCP (6), length 52)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (.), cksum 0xd0b6 (correct), seq 1, ack 518, win 30, options (nop,nop,TS val 2658867668 ecr 3241323465), length 0
10:45:01.381187 IP (tos 0x0, ttl 51, id 25525, offset 0, flags (DF), proto TCP (6), length 1280)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (.), cksum 0xf41a (correct), seq 1:1229, ack 518, win 30, options (nop,nop,TS val 2658867668 ecr 3241323465), length 1228
10:45:01.381221 IP (tos 0x0, ttl 64, id 59547, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.58548 > 149.154.167.220.443: Flags (.), cksum 0x1b4b (incorrect -> 0xca09), seq 518, ack 1229, win 501, options (nop,nop,TS val 3241323475 ecr 2658867668), length 0
10:45:01.381249 IP (tos 0x0, ttl 51, id 25526, offset 0, flags (DF), proto TCP (6), length 2920)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (P.), cksum 0x267f (incorrect -> 0xcba5), seq 1229:4097, ack 518, win 30, options (nop,nop,TS val 2658867668 ecr 3241323465), length 2868
10:45:01.381276 IP (tos 0x0, ttl 64, id 59548, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.58548 > 149.154.167.220.443: Flags (.), cksum 0x1b4b (incorrect -> 0xbee2), seq 518, ack 4097, win 488, options (nop,nop,TS val 3241323475 ecr 2658867668), length 0
10:45:01.382095 IP (tos 0x0, ttl 51, id 25529, offset 0, flags (DF), proto TCP (6), length 1678)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (P.), cksum 0x21a5 (incorrect -> 0xd74d), seq 4097:5723, ack 518, win 30, options (nop,nop,TS val 2658867668 ecr 3241323465), length 1626
10:45:01.382135 IP (tos 0x0, ttl 64, id 59549, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.58548 > 149.154.167.220.443: Flags (.), cksum 0x1b4b (incorrect -> 0xb87a), seq 518, ack 5723, win 501, options (nop,nop,TS val 3241323476 ecr 2658867668), length 0
10:45:01.384659 IP (tos 0x0, ttl 64, id 59550, offset 0, flags (DF), proto TCP (6), length 132)
    192.168.29.5.58548 > 149.154.167.220.443: Flags (P.), cksum 0x1b9b (incorrect -> 0x6ffb), seq 518:598, ack 5723, win 501, options (nop,nop,TS val 3241323479 ecr 2658867668), length 80
10:45:01.395364 IP (tos 0x0, ttl 51, id 25531, offset 0, flags (DF), proto TCP (6), length 339)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (P.), cksum 0x9d90 (correct), seq 5723:6010, ack 598, win 30, options (nop,nop,TS val 2658867672 ecr 3241323479), length 287
10:45:01.395465 IP (tos 0x0, ttl 64, id 59551, offset 0, flags (DF), proto TCP (6), length 336)
    192.168.29.5.58548 > 149.154.167.220.443: Flags (P.), cksum 0x1c67 (incorrect -> 0x08e5), seq 598:882, ack 6010, win 501, options (nop,nop,TS val 3241323489 ecr 2658867672), length 284
10:45:01.395490 IP (tos 0x0, ttl 51, id 25532, offset 0, flags (DF), proto TCP (6), length 339)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (P.), cksum 0x6770 (correct), seq 6010:6297, ack 598, win 30, options (nop,nop,TS val 2658867672 ecr 3241323479), length 287
10:45:01.395514 IP (tos 0x0, ttl 64, id 59552, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.58548 > 149.154.167.220.443: Flags (.), cksum 0x1b4b (incorrect -> 0xb4bf), seq 882, ack 6297, win 501, options (nop,nop,TS val 3241323489 ecr 2658867672), length 0
10:45:01.446238 IP (tos 0x0, ttl 51, id 25533, offset 0, flags (DF), proto TCP (6), length 52)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (.), cksum 0xb688 (correct), seq 6297, ack 882, win 31, options (nop,nop,TS val 2658867685 ecr 3241323489), length 0
10:45:01.620992 IP (tos 0x0, ttl 64, id 32405, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.39916 > 192.168.29.5.8080: Flags (F.), cksum 0xbb81 (incorrect -> 0xaabb), seq 146, ack 160, win 512, options (nop,nop,TS val 850541504 ecr 850541140), length 0
10:45:01.622577 IP (tos 0x0, ttl 64, id 20102, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8080 > 192.168.29.5.39916: Flags (F.), cksum 0xbb81 (incorrect -> 0xa94d), seq 160, ack 147, win 512, options (nop,nop,TS val 850541505 ecr 850541504), length 0
10:45:01.622646 IP (tos 0x0, ttl 64, id 32406, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.39916 > 192.168.29.5.8080: Flags (.), cksum 0xbb81 (incorrect -> 0xa94b), seq 147, ack 161, win 512, options (nop,nop,TS val 850541506 ecr 850541505), length 0
10:45:07.190931 IP (tos 0x0, ttl 64, id 21755, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.32846 > 192.168.29.5.8443: Flags (F.), cksum 0xbb81 (incorrect -> 0xdce2), seq 1, ack 4204, win 512, options (nop,nop,TS val 850547074 ecr 850536321), length 0
10:45:07.190957 IP (tos 0x0, ttl 64, id 0, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8443 > 192.168.29.5.32846: Flags (.), cksum 0xb2e1 (correct), seq 4204, ack 2, win 512, options (nop,nop,TS val 850547074 ecr 850547074), length 0
10:45:31.406939 IP (tos 0x0, ttl 51, id 25534, offset 0, flags (DF), proto TCP (6), length 484)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (P.), cksum 0x04a2 (correct), seq 6297:6729, ack 882, win 31, options (nop,nop,TS val 2658875175 ecr 3241323489), length 432
10:45:31.406939 IP (tos 0x0, ttl 51, id 25535, offset 0, flags (DF), proto TCP (6), length 76)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (P.), cksum 0xe0aa (correct), seq 6729:6753, ack 882, win 31, options (nop,nop,TS val 2658875175 ecr 3241323489), length 24


und

10:46:23.537591 IP (tos 0x0, ttl 64, id 24220, offset 0, flags (DF), proto TCP (6), length 394)
    192.168.29.5.8443 > 192.168.29.5.35386: Flags (P.), cksum 0xbcd7 (incorrect -> 0xc854), seq 2797:3139, ack 205, win 512, options (nop,nop,TS val 850623420 ecr 850620069), length 342
10:46:23.537642 IP (tos 0x0, ttl 64, id 61932, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.35386 > 192.168.29.5.8443: Flags (.), cksum 0xbb81 (incorrect -> 0xb3b0), seq 205, ack 3139, win 506, options (nop,nop,TS val 850623421 ecr 850623420), length 0
10:46:27.742757 IP (tos 0x0, ttl 64, id 24221, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8443 > 192.168.29.5.35386: Flags (F.), cksum 0xbb81 (incorrect -> 0xa33b), seq 3139, ack 205, win 512, options (nop,nop,TS val 850627626 ecr 850623421), length 0
10:46:27.783943 IP (tos 0x0, ttl 64, id 61933, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.35386 > 192.168.29.5.8443: Flags (.), cksum 0xbb81 (incorrect -> 0x92a5), seq 205, ack 3140, win 512, options (nop,nop,TS val 850627667 ecr 850627626), length 0
10:46:30.972489 IP (tos 0x0, ttl 64, id 61934, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.35386 > 192.168.29.5.8443: Flags (F.), cksum 0xbb81 (incorrect -> 0x8630), seq 205, ack 3140, win 512, options (nop,nop,TS val 850630855 ecr 850627626), length 0
10:46:30.972540 IP (tos 0x0, ttl 64, id 0, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8443 > 192.168.29.5.35386: Flags (.), cksum 0x7993 (correct), seq 3140, ack 206, win 512, options (nop,nop,TS val 850630855 ecr 850630855), length 0


was uns interessiert sind die Momente, in denen die Verbindung beendet wird, das ist das tcp Flag "FIN" (hier "F")

10:44:30.335410 IP (tos 0x0, ttl 51, id 33436, offset 0, flags (DF), proto TCP (6), length 52)
    149.154.167.220.443 > 192.168.29.5.56792: Flags (F.), cksum 0x3ea8 (correct), seq 456, ack 1, win 31, options (nop,nop,TS val 1860475461 ecr 3241262418), length 0
10:44:30.337226 IP (tos 0x0, ttl 64, id 894, offset 0, flags (DF), proto TCP (6), length 76)
    192.168.29.5.56792 > 149.154.167.220.443: Flags (P.), cksum 0x1b63 (incorrect -> 0x00c0), seq 1:25, ack 457, win 501, options (nop,nop,TS val 3241292431 ecr 1860475461), length 24
--
10:44:39.972083 IP (tos 0x0, ttl 64, id 19780, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.39012 > 192.168.29.5.8080: Flags (F.), cksum 0xbb81 (incorrect -> 0xc42c), seq 147, ack 14989, win 512, options (nop,nop,TS val 850519855 ecr 850519851), length 0
10:44:39.973326 IP (tos 0x0, ttl 64, id 10692, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8080 > 192.168.29.5.39012: Flags (F.), cksum 0xbb81 (incorrect -> 0xc426), seq 14989, ack 148, win 512, options (nop,nop,TS val 850519856 ecr 850519855), length 0
10:44:39.973374 IP (tos 0x0, ttl 64, id 19781, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.39012 > 192.168.29.5.8080: Flags (.), cksum 0xbb81 (incorrect -> 0xc425), seq 148, ack 14990, win 512, options (nop,nop,TS val 850519856 ecr 850519856), length 0
--
10:44:42.628353 IP (tos 0x0, ttl 64, id 65294, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.55068 > 151.106.67.104.443: Flags (F.), cksum 0xb8a6 (incorrect -> 0x3bce), seq 988, ack 686062, win 1050, options (nop,nop,TS val 3214818288 ecr 1173025420), length 0
10:44:42.644597 IP (tos 0x0, ttl 52, id 14038, offset 0, flags (DF), proto TCP (6), length 83)
    151.106.67.104.443 > 192.168.29.5.55068: Flags (P.), cksum 0x8381 (correct), seq 686062:686093, ack 989, win 61, options (nop,nop,TS val 1173025523 ecr 3214818288), length 31
--
10:44:42.644876 IP (tos 0x0, ttl 52, id 14039, offset 0, flags (DF), proto TCP (6), length 52)
    151.106.67.104.443 > 192.168.29.5.55068: Flags (F.), cksum 0x3f24 (correct), seq 686093, ack 989, win 61, options (nop,nop,TS val 1173025523 ecr 3214818288), length 0
10:44:42.644906 IP (tos 0x0, ttl 64, id 0, offset 0, flags (DF), proto TCP (6), length 40)
    192.168.29.5.55068 > 151.106.67.104.443: Flags (R), cksum 0xa1bd (correct), seq 2211444987, win 0, length 0
--
10:44:56.437896 IP (tos 0x0, ttl 64, id 29889, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8443 > 192.168.29.5.32846: Flags (F.), cksum 0xbb81 (incorrect -> 0x0ca9), seq 4203, ack 1, win 512, options (nop,nop,TS val 850536321 ecr 850534845), length 0
10:44:56.478962 IP (tos 0x0, ttl 64, id 21754, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.32846 > 192.168.29.5.8443: Flags (.), cksum 0xbb81 (incorrect -> 0x06c2), seq 1, ack 4204, win 506, options (nop,nop,TS val 850536362 ecr 850536321), length 0
--
10:45:00.461936 IP (tos 0x0, ttl 51, id 44995, offset 0, flags (DF), proto TCP (6), length 52)
    149.154.167.220.443 > 192.168.29.5.57514: Flags (F.), cksum 0x196c (correct), seq 6753, ack 882, win 31, options (nop,nop,TS val 1860530869 ecr 3241292543), length 0
10:45:00.495252 IP (tos 0x0, ttl 64, id 32401, offset 0, flags (DF), proto TCP (6), length 60)
    192.168.29.5.39916 > 192.168.29.5.8080: Flags (S), cksum 0xbb89 (incorrect -> 0xaf49), seq 3813333643, win 65495, options (mss 65495,sackOK,TS val 850540378 ecr 0,nop,wscale 7), length 0
--
10:45:01.620992 IP (tos 0x0, ttl 64, id 32405, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.39916 > 192.168.29.5.8080: Flags (F.), cksum 0xbb81 (incorrect -> 0xaabb), seq 146, ack 160, win 512, options (nop,nop,TS val 850541504 ecr 850541140), length 0
10:45:01.622577 IP (tos 0x0, ttl 64, id 20102, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8080 > 192.168.29.5.39916: Flags (F.), cksum 0xbb81 (incorrect -> 0xa94d), seq 160, ack 147, win 512, options (nop,nop,TS val 850541505 ecr 850541504), length 0
10:45:01.622646 IP (tos 0x0, ttl 64, id 32406, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.39916 > 192.168.29.5.8080: Flags (.), cksum 0xbb81 (incorrect -> 0xa94b), seq 147, ack 161, win 512, options (nop,nop,TS val 850541506 ecr 850541505), length 0
10:45:07.190931 IP (tos 0x0, ttl 64, id 21755, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.32846 > 192.168.29.5.8443: Flags (F.), cksum 0xbb81 (incorrect -> 0xdce2), seq 1, ack 4204, win 512, options (nop,nop,TS val 850547074 ecr 850536321), length 0
10:45:07.190957 IP (tos 0x0, ttl 64, id 0, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8443 > 192.168.29.5.32846: Flags (.), cksum 0xb2e1 (correct), seq 4204, ack 2, win 512, options (nop,nop,TS val 850547074 ecr 850547074), length 0
--
10:45:31.407276 IP (tos 0x0, ttl 51, id 25536, offset 0, flags (DF), proto TCP (6), length 52)
    149.154.167.220.443 > 192.168.29.5.58548: Flags (F.), cksum 0x977d (correct), seq 6753, ack 882, win 31, options (nop,nop,TS val 2658875175 ecr 3241323489), length 0
10:45:31.409766 IP (tos 0x0, ttl 64, id 59555, offset 0, flags (DF), proto TCP (6), length 76)
    192.168.29.5.58548 > 149.154.167.220.443: Flags (P.), cksum 0x1b63 (incorrect -> 0x5ffc), seq 882:906, ack 6754, win 501, options (nop,nop,TS val 3241353504 ecr 2658875175), length 24
--
10:46:01.094634 IP (tos 0x0, ttl 64, id 11947, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.40590 > 192.168.29.5.8080: Flags (F.), cksum 0xbb81 (incorrect -> 0x4448), seq 139, ack 19833, win 512, options (nop,nop,TS val 850600977 ecr 850600968), length 0
10:46:01.095018 IP (tos 0x0, ttl 64, id 55778, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8080 > 192.168.29.5.40590: Flags (F.), cksum 0xbb81 (incorrect -> 0x443d), seq 19833, ack 140, win 512, options (nop,nop,TS val 850600978 ecr 850600977), length 0
10:46:01.095053 IP (tos 0x0, ttl 64, id 11948, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.40590 > 192.168.29.5.8080: Flags (.), cksum 0xbb81 (incorrect -> 0x443c), seq 140, ack 19834, win 512, options (nop,nop,TS val 850600978 ecr 850600978), length 0
10:46:01.108374 IP (tos 0x0, ttl 64, id 1789, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.35340 > 192.168.29.5.8443: Flags (F.), cksum 0xbb81 (incorrect -> 0x9119), seq 205, ack 335, win 512, options (nop,nop,TS val 850600991 ecr 850600488), length 0
10:46:01.108684 IP (tos 0x0, ttl 64, id 31595, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8443 > 192.168.29.5.35340: Flags (F.), cksum 0xbb81 (incorrect -> 0x8f20), seq 335, ack 206, win 512, options (nop,nop,TS val 850600992 ecr 850600991), length 0
10:46:01.108716 IP (tos 0x0, ttl 64, id 1790, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.35340 > 192.168.29.5.8443: Flags (.), cksum 0xbb81 (incorrect -> 0x8f1f), seq 206, ack 336, win 512, options (nop,nop,TS val 850600992 ecr 850600992), length 0
--
10:46:01.543600 IP (tos 0x0, ttl 51, id 6670, offset 0, flags (DF), proto TCP (6), length 52)
    149.154.167.220.443 > 192.168.29.5.59022: Flags (F.), cksum 0xb20f (correct), seq 6753, ack 882, win 31, options (nop,nop,TS val 1860498453 ecr 3241353626), length 0
10:46:01.583927 IP (tos 0x0, ttl 64, id 14624, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.59022 > 149.154.167.220.443: Flags (.), cksum 0x1b4b (incorrect -> 0x3ad5), seq 882, ack 6754, win 501, options (nop,nop,TS val 3241383678 ecr 1860498453), length 0
--
10:46:27.742757 IP (tos 0x0, ttl 64, id 24221, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8443 > 192.168.29.5.35386: Flags (F.), cksum 0xbb81 (incorrect -> 0xa33b), seq 3139, ack 205, win 512, options (nop,nop,TS val 850627626 ecr 850623421), length 0
10:46:27.783943 IP (tos 0x0, ttl 64, id 61933, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.35386 > 192.168.29.5.8443: Flags (.), cksum 0xbb81 (incorrect -> 0x92a5), seq 205, ack 3140, win 512, options (nop,nop,TS val 850627667 ecr 850627626), length 0
10:46:30.972489 IP (tos 0x0, ttl 64, id 61934, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.35386 > 192.168.29.5.8443: Flags (F.), cksum 0xbb81 (incorrect -> 0x8630), seq 205, ack 3140, win 512, options (nop,nop,TS val 850630855 ecr 850627626), length 0
10:46:30.972540 IP (tos 0x0, ttl 64, id 0, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8443 > 192.168.29.5.35386: Flags (.), cksum 0x7993 (correct), seq 3140, ack 206, win 512, options (nop,nop,TS val 850630855 ecr 850630855), length 0
--
10:47:00.848445 IP (tos 0x0, ttl 64, id 24777, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.41298 > 192.168.29.5.8080: Flags (F.), cksum 0xbb81 (incorrect -> 0x86e2), seq 146, ack 1277, win 512, options (nop,nop,TS val 850660731 ecr 850660663), length 0
10:47:00.848879 IP (tos 0x0, ttl 64, id 34684, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.8080 > 192.168.29.5.41298: Flags (F.), cksum 0xbb81 (incorrect -> 0x869c), seq 1277, ack 147, win 512, options (nop,nop,TS val 850660732 ecr 850660731), length 0
10:47:00.848946 IP (tos 0x0, ttl 64, id 24778, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.41298 > 192.168.29.5.8080: Flags (.), cksum 0xbb81 (incorrect -> 0x869b), seq 147, ack 1278, win 512, options (nop,nop,TS val 850660732 ecr 850660732), length 0
--
10:47:02.424103 IP (tos 0x0, ttl 51, id 55261, offset 0, flags (DF), proto TCP (6), length 52)
    149.154.167.220.443 > 192.168.29.5.59742: Flags (F.), cksum 0x6a25 (correct), seq 6753, ack 882, win 31, options (nop,nop,TS val 1860513674 ecr 3241414506), length 0
10:47:02.464946 IP (tos 0x0, ttl 64, id 16247, offset 0, flags (DF), proto TCP (6), length 52)
    192.168.29.5.59742 > 149.154.167.220.443: Flags (.), cksum 0x1b4b (incorrect -> 0xf2e9), seq 882, ack 6754, win 501, options (nop,nop,TS val 3241444559 ecr 1860513674), length 0


Ich werde nicth ganz schlau daraus, warum so viele FIN Pakete hier drin sind (es gehören immer zwei dazu, ein FIN und ein FIN ACK) - ich vermute, dass es mit den verschiedenen Ports zu tun hat.

Ich muss mir das in Wireshark ansehen.

pj

pjakobs

so, ich hab mich mal mit wireshark über die Daten her gemacht. Leider sind die aktuell noch nicht Timestamp korelliert, aber ich sehe zwei Arten von Verbindungs abbrüchen, von denen ich den ersten eher im Verdacht habe:


No.     Time           Source                Destination           Protocol Length Info
   1395 25.845058      192.168.29.5          192.168.29.5          TCP      76     47988 → 8080 (SYN) Seq=0 Win=65495 Len=0 MSS=65495 SACK_PERM=1 TSval=935488156 TSecr=0 WS=128

Frame 1395: 76 bytes on wire (608 bits), 76 bytes captured (608 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 47988, Dst Port: 8080, Seq: 0, Len: 0
    Source Port: 47988
    Destination Port: 8080
    (Stream index: 95)
    (TCP Segment Len: 0)
    Sequence number: 0    (relative sequence number)
    (Next sequence number: 0    (relative sequence number))
    Acknowledgment number: 0
    1010 .... = Header Length: 40 bytes (10)
    Flags: 0x002 (SYN)
    Window size value: 65495
    (Calculated window size: 65495)
    Checksum: 0xbb89 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (20 bytes), Maximum segment size, SACK permitted, Timestamps, No-Operation (NOP), Window scale
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   1396 25.845107      192.168.29.5          192.168.29.5          TCP      76     8080 → 47988 (SYN, ACK) Seq=0 Ack=1 Win=65483 Len=0 MSS=65495 SACK_PERM=1 TSval=935488156 TSecr=935488156 WS=128

Frame 1396: 76 bytes on wire (608 bits), 76 bytes captured (608 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8080, Dst Port: 47988, Seq: 0, Ack: 1, Len: 0
    Source Port: 8080
    Destination Port: 47988
    (Stream index: 95)
    (TCP Segment Len: 0)
    Sequence number: 0    (relative sequence number)
    (Next sequence number: 0    (relative sequence number))
    Acknowledgment number: 1    (relative ack number)
    1010 .... = Header Length: 40 bytes (10)
    Flags: 0x012 (SYN, ACK)
    Window size value: 65483
    (Calculated window size: 65483)
    Checksum: 0xbb89 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (20 bytes), Maximum segment size, SACK permitted, Timestamps, No-Operation (NOP), Window scale
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   1397 25.845139      192.168.29.5          192.168.29.5          TCP      68     47988 → 8080 (ACK) Seq=1 Ack=1 Win=65536 Len=0 TSval=935488156 TSecr=935488156

Frame 1397: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 47988, Dst Port: 8080, Seq: 1, Ack: 1, Len: 0
    Source Port: 47988
    Destination Port: 8080
    (Stream index: 95)
    (TCP Segment Len: 0)
    Sequence number: 1    (relative sequence number)
    (Next sequence number: 1    (relative sequence number))
    Acknowledgment number: 1    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   1400 25.850026      192.168.29.5          192.168.29.5          TCP      213    47988 → 8080 (PSH, ACK) Seq=1 Ack=1 Win=65536 Len=145 TSval=935488161 TSecr=935488156 (TCP segment of a reassembled PDU)

Frame 1400: 213 bytes on wire (1704 bits), 213 bytes captured (1704 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 47988, Dst Port: 8080, Seq: 1, Ack: 1, Len: 145
    Source Port: 47988
    Destination Port: 8080
    (Stream index: 95)
    (TCP Segment Len: 145)
    Sequence number: 1    (relative sequence number)
    (Next sequence number: 146    (relative sequence number))
    Acknowledgment number: 1    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbc12 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (145 bytes)
    (Reassembled PDU in frame: 1404)
    TCP segment data (145 bytes)

No.     Time           Source                Destination           Protocol Length Info
   1401 25.850079      192.168.29.5          192.168.29.5          TCP      68     8080 → 47988 (ACK) Seq=1 Ack=146 Win=65408 Len=0 TSval=935488161 TSecr=935488161

Frame 1401: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8080, Dst Port: 47988, Seq: 1, Ack: 146, Len: 0
    Source Port: 8080
    Destination Port: 47988
    (Stream index: 95)
    (TCP Segment Len: 0)
    Sequence number: 1    (relative sequence number)
    (Next sequence number: 1    (relative sequence number))
    Acknowledgment number: 146    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 511
    (Calculated window size: 65408)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   1402 25.851162      192.168.29.5          192.168.29.5          HTTP     1344   HTTP/1.1 200 OK  (application/json)

Frame 1402: 1344 bytes on wire (10752 bits), 1344 bytes captured (10752 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8080, Dst Port: 47988, Seq: 1, Ack: 146, Len: 1276
    Source Port: 8080
    Destination Port: 47988
    (Stream index: 95)
    (TCP Segment Len: 1276)
    Sequence number: 1    (relative sequence number)
    (Next sequence number: 1277    (relative sequence number))
    Acknowledgment number: 146    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xc07d (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (1276 bytes)
Hypertext Transfer Protocol
JavaScript Object Notation: application/json

No.     Time           Source                Destination           Protocol Length Info
   1403 25.851216      192.168.29.5          192.168.29.5          TCP      68     47988 → 8080 (ACK) Seq=146 Ack=1277 Win=64384 Len=0 TSval=935488162 TSecr=935488162

Frame 1403: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 47988, Dst Port: 8080, Seq: 146, Ack: 1277, Len: 0
    Source Port: 47988
    Destination Port: 8080
    (Stream index: 95)
    (TCP Segment Len: 0)
    Sequence number: 146    (relative sequence number)
    (Next sequence number: 146    (relative sequence number))
    Acknowledgment number: 1277    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 503
    (Calculated window size: 64384)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   1404 25.853206      192.168.29.5          192.168.29.5          HTTP     68     GET /api/3706384256/lights HTTP/1.0

Frame 1404: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 47988, Dst Port: 8080, Seq: 146, Ack: 1277, Len: 0
    Source Port: 47988
    Destination Port: 8080
    (Stream index: 95)
    (TCP Segment Len: 0)
    Sequence number: 146    (relative sequence number)
    (Next sequence number: 146    (relative sequence number))
    Acknowledgment number: 1277    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x011 (FIN, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (Timestamps)
(2 Reassembled TCP Segments (145 bytes): #1400(145), #1404(0))
Hypertext Transfer Protocol

No.     Time           Source                Destination           Protocol Length Info
   1405 25.854275      192.168.29.5          192.168.29.5          TCP      68     8080 → 47988 (FIN, ACK) Seq=1277 Ack=147 Win=65536 Len=0 TSval=935488165 TSecr=935488164

Frame 1405: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8080, Dst Port: 47988, Seq: 1277, Ack: 147, Len: 0
    Source Port: 8080
    Destination Port: 47988
    (Stream index: 95)
    (TCP Segment Len: 0)
    Sequence number: 1277    (relative sequence number)
    (Next sequence number: 1277    (relative sequence number))
    Acknowledgment number: 147    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x011 (FIN, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   1406 25.854340      192.168.29.5          192.168.29.5          TCP      68     47988 → 8080 (ACK) Seq=147 Ack=1278 Win=65536 Len=0 TSval=935488165 TSecr=935488165

Frame 1406: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 47988, Dst Port: 8080, Seq: 147, Ack: 1278, Len: 0
    Source Port: 47988
    Destination Port: 8080
    (Stream index: 95)
    (TCP Segment Len: 0)
    Sequence number: 147    (relative sequence number)
    (Next sequence number: 147    (relative sequence number))
    Acknowledgment number: 1278    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)


hier schickt der Client die völlig normale Abfrage nach "GET /api/3706384256/lights" woraufhin der deConz Server die Verbindung kommentarlos mit einem leeren Paket mit gesetztem FIN Flag schließt.

Wenn ich die gleiche Anfrage vom Browser sende bekomme ich die korrekte Response

{"1":{"etag":"562371fd334ea60e32f26262a3be91f0","hascolor":false,"lastannounced":null,"lastseen":"2020-10-09T10:37:39Z","manufacturername":"dresden elektronik","modelid":"ConBee II","name":"Configuration tool 1","state":{"reachable":true},"swversion":"0x264a0700","type":"Configuration tool","uniqueid":"00:21:2e:ff:ff:05:c8:7f-01"},"2":{"etag":"d576b05f374a9d835df743ed63a6d66e","hascolor":false,"lastannounced":"2020-09-05T11:19:30Z","lastseen":"2020-10-09T10:37:47Z","manufacturername":"OSRAM","modelid":"Plug 01","name":"Steckdose","state":{"alert":"none","on":true,"reachable":true},"swversion":"V1.05.09","type":"On/Off plug-in unit","uniqueid":"7c:b0:3e:aa:0a:09:c9:45-03"},"3":{"ctmax":370,"ctmin":153,"etag":"9b0b78d166c7f20229ab99c794156e3f","hascolor":true,"lastannounced":"2020-10-04T01:08:25Z","lastseen":"2020-10-09T10:37:22Z","manufacturername":"OSRAM","modelid":"CLA60 TW OSRAM","name":"Color temperature light 3","state":{"alert":"none","bri":254,"colormode":"ct","ct":370,"on":false,"reachable":true},"swversion":"V1.05.10","type":"Color temperature light","uniqueid":"7c:b0:3e:aa:00:af:63:27-03"}}


Das zweite Verbindungsende ist, für mich, ein normaler Teardown der TLS connection. Das ist zwar beim Wiederaufbau rechenaufwendig, aber nicht grunsätzlich verkehrt, zumindest scheinen hier vollständige Daten übertragen zu werden:
[code]
No.     Time           Source                Destination           Protocol Length Info
   1386 25.841148      192.168.29.5          192.168.29.5          TCP      76     42738 → 8443 (SYN) Seq=0 Win=65495 Len=0 MSS=65495 SACK_PERM=1 TSval=935488152 TSecr=0 WS=128

Frame 1386: 76 bytes on wire (608 bits), 76 bytes captured (608 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 0, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 0    (relative sequence number)
    (Next sequence number: 0    (relative sequence number))
    Acknowledgment number: 0
    1010 .... = Header Length: 40 bytes (10)
    Flags: 0x002 (SYN)
    Window size value: 65495
    (Calculated window size: 65495)
    Checksum: 0xbb89 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (20 bytes), Maximum segment size, SACK permitted, Timestamps, No-Operation (NOP), Window scale
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   1387 25.841214      192.168.29.5          192.168.29.5          TCP      76     8443 → 42738 (SYN, ACK) Seq=0 Ack=1 Win=65483 Len=0 MSS=65495 SACK_PERM=1 TSval=935488152 TSecr=935488152 WS=128

Frame 1387: 76 bytes on wire (608 bits), 76 bytes captured (608 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 0, Ack: 1, Len: 0
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 0    (relative sequence number)
    (Next sequence number: 0    (relative sequence number))
    Acknowledgment number: 1    (relative ack number)
    1010 .... = Header Length: 40 bytes (10)
    Flags: 0x012 (SYN, ACK)
    Window size value: 65483
    (Calculated window size: 65483)
    Checksum: 0xbb89 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (20 bytes), Maximum segment size, SACK permitted, Timestamps, No-Operation (NOP), Window scale
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   1388 25.841252      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=1 Ack=1 Win=65536 Len=0 TSval=935488152 TSecr=935488152

Frame 1388: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 1, Ack: 1, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 1    (relative sequence number)
    (Next sequence number: 1    (relative sequence number))
    Acknowledgment number: 1    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   1389 25.842665      192.168.29.5          192.168.29.5          HTTP     272    GET ws://192.168.29.5:8443 HTTP/1.1

Frame 1389: 272 bytes on wire (2176 bits), 272 bytes captured (2176 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 1, Ack: 1, Len: 204
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 204)
    Sequence number: 1    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 1    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbc4d (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (204 bytes)
Hypertext Transfer Protocol

No.     Time           Source                Destination           Protocol Length Info
   1390 25.842716      192.168.29.5          192.168.29.5          TCP      68     8443 → 42738 (ACK) Seq=1 Ack=205 Win=65280 Len=0 TSval=935488154 TSecr=935488154

Frame 1390: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 1, Ack: 205, Len: 0
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 1    (relative sequence number)
    (Next sequence number: 1    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 510
    (Calculated window size: 65280)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   1391 25.843897      192.168.29.5          192.168.29.5          HTTP     402    HTTP/1.1 101 Switching Protocols

Frame 1391: 402 bytes on wire (3216 bits), 402 bytes captured (3216 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 1, Ack: 205, Len: 334
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 334)
    Sequence number: 1    (relative sequence number)
    (Next sequence number: 335    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbccf (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (334 bytes)
Hypertext Transfer Protocol

No.     Time           Source                Destination           Protocol Length Info
   1392 25.843951      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=335 Win=65280 Len=0 TSval=935488155 TSecr=935488155

Frame 1392: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 335, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 335    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 510
    (Calculated window size: 65280)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   2510 28.611998      192.168.29.5          192.168.29.5          WebSocket 410    WebSocket Text (FIN)

Frame 2510: 410 bytes on wire (3280 bits), 410 bytes captured (3280 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 335, Ack: 205, Len: 342
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 342)
    Sequence number: 335    (relative sequence number)
    (Next sequence number: 677    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbcd7 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (342 bytes)
    (PDU Size: 342)
WebSocket
Line-based text data (1 lines)

No.     Time           Source                Destination           Protocol Length Info
   2511 28.612055      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=677 Win=65024 Len=0 TSval=935490923 TSecr=935490923

Frame 2511: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 677, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 677    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 508
    (Calculated window size: 65024)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   4818 31.974968      192.168.29.5          192.168.29.5          WebSocket 410    WebSocket Text (FIN)

Frame 4818: 410 bytes on wire (3280 bits), 410 bytes captured (3280 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 677, Ack: 205, Len: 342
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 342)
    Sequence number: 677    (relative sequence number)
    (Next sequence number: 1019    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbcd7 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (342 bytes)
    (PDU Size: 342)
WebSocket
Line-based text data (1 lines)

No.     Time           Source                Destination           Protocol Length Info
   4819 31.975016      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=1019 Win=64768 Len=0 TSval=935494286 TSecr=935494286

Frame 4819: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 1019, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 1019    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 506
    (Calculated window size: 64768)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   4939 35.334988      192.168.29.5          192.168.29.5          WebSocket 410    WebSocket Text (FIN)

Frame 4939: 410 bytes on wire (3280 bits), 410 bytes captured (3280 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 1019, Ack: 205, Len: 342
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 342)
    Sequence number: 1019    (relative sequence number)
    (Next sequence number: 1361    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbcd7 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (342 bytes)
    (PDU Size: 342)
WebSocket
Line-based text data (1 lines)

No.     Time           Source                Destination           Protocol Length Info
   4940 35.335036      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=1361 Win=64768 Len=0 TSval=935497646 TSecr=935497646

Frame 4940: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 1361, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 1361    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 506
    (Calculated window size: 64768)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   5000 38.694206      192.168.29.5          192.168.29.5          WebSocket 410    WebSocket Text (FIN)

Frame 5000: 410 bytes on wire (3280 bits), 410 bytes captured (3280 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 1361, Ack: 205, Len: 342
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 342)
    Sequence number: 1361    (relative sequence number)
    (Next sequence number: 1703    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbcd7 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (342 bytes)
    (PDU Size: 342)
WebSocket
Line-based text data (1 lines)

No.     Time           Source                Destination           Protocol Length Info
   5001 38.694255      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=1703 Win=64768 Len=0 TSval=935501005 TSecr=935501005

Frame 5001: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 1703, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 1703    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 506
    (Calculated window size: 64768)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   5325 43.045842      192.168.29.5          192.168.29.5          WebSocket 401    WebSocket Text (FIN)

Frame 5325: 401 bytes on wire (3208 bits), 401 bytes captured (3208 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 1703, Ack: 205, Len: 333
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 333)
    Sequence number: 1703    (relative sequence number)
    (Next sequence number: 2036    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbcce (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (333 bytes)
    (PDU Size: 333)
WebSocket
Line-based text data (1 lines)

No.     Time           Source                Destination           Protocol Length Info
   5326 43.045890      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=2036 Win=64768 Len=0 TSval=935505357 TSecr=935505357

Frame 5326: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 2036, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 2036    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 506
    (Calculated window size: 64768)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   5525 46.403001      192.168.29.5          192.168.29.5          WebSocket 401    WebSocket Text (FIN)

Frame 5525: 401 bytes on wire (3208 bits), 401 bytes captured (3208 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 2036, Ack: 205, Len: 333
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 333)
    Sequence number: 2036    (relative sequence number)
    (Next sequence number: 2369    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbcce (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (333 bytes)
    (PDU Size: 333)
WebSocket
Line-based text data (1 lines)

No.     Time           Source                Destination           Protocol Length Info
   5526 46.403050      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=2369 Win=64768 Len=0 TSval=935508714 TSecr=935508714

Frame 5526: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 2369, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 2369    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 506
    (Calculated window size: 64768)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   5799 49.761716      192.168.29.5          192.168.29.5          WebSocket 428    WebSocket Text (FIN)

Frame 5799: 428 bytes on wire (3424 bits), 428 bytes captured (3424 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 2369, Ack: 205, Len: 360
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 360)
    Sequence number: 2369    (relative sequence number)
    (Next sequence number: 2729    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbce9 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (360 bytes)
    (PDU Size: 360)
WebSocket
Line-based text data (1 lines)

No.     Time           Source                Destination           Protocol Length Info
   5800 49.761762      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=2729 Win=64768 Len=0 TSval=935512073 TSecr=935512073

Frame 5800: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 2729, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 2729    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 506
    (Calculated window size: 64768)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   5964 53.124952      192.168.29.5          192.168.29.5          WebSocket 428    WebSocket Text (FIN)

Frame 5964: 428 bytes on wire (3424 bits), 428 bytes captured (3424 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 2729, Ack: 205, Len: 360
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 360)
    Sequence number: 2729    (relative sequence number)
    (Next sequence number: 3089    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbce9 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (360 bytes)
    (PDU Size: 360)
WebSocket
Line-based text data (1 lines)

No.     Time           Source                Destination           Protocol Length Info
   5965 53.124996      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=3089 Win=64768 Len=0 TSval=935515436 TSecr=935515436

Frame 5965: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 3089, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 3089    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 506
    (Calculated window size: 64768)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   5988 53.453830      192.168.29.5          192.168.29.5          WebSocket 401    WebSocket Text (FIN)

Frame 5988: 401 bytes on wire (3208 bits), 401 bytes captured (3208 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 3089, Ack: 205, Len: 333
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 333)
    Sequence number: 3089    (relative sequence number)
    (Next sequence number: 3422    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbcce (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (333 bytes)
    (PDU Size: 333)
WebSocket
Line-based text data (1 lines)

No.     Time           Source                Destination           Protocol Length Info
   5989 53.453879      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=3422 Win=64768 Len=0 TSval=935515765 TSecr=935515765

Frame 5989: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 3422, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 3422    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window size value: 506
    (Calculated window size: 64768)
    (Window size scaling factor: 128)
    Checksum: 0xbb81 (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)

No.     Time           Source                Destination           Protocol Length Info
   5990 53.456961      192.168.29.5          192.168.29.5          WebSocket 162    WebSocket Text (FIN)

Frame 5990: 162 bytes on wire (1296 bits), 162 bytes captured (1296 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 8443, Dst Port: 42738, Seq: 3422, Ack: 205, Len: 94
    Source Port: 8443
    Destination Port: 42738
    (Stream index: 94)
    (TCP Segment Len: 94)
    Sequence number: 3422    (relative sequence number)
    (Next sequence number: 3516    (relative sequence number))
    Acknowledgment number: 205    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x018 (PSH, ACK)
    Window size value: 512
    (Calculated window size: 65536)
    (Window size scaling factor: 128)
    Checksum: 0xbbdf (unverified)
    (Checksum Status: Unverified)
    Urgent pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
    (SEQ/ACK analysis)
    (Timestamps)
    TCP payload (94 bytes)
    (PDU Size: 94)
WebSocket
Line-based text data (1 lines)

No.     Time           Source                Destination           Protocol Length Info
   5991 53.456998      192.168.29.5          192.168.29.5          TCP      68     42738 → 8443 (ACK) Seq=205 Ack=3516 Win=64896 Len=0 TSval=935515768 TSecr=935515768

Frame 5991: 68 bytes on wire (544 bits), 68 bytes captured (544 bits)
Linux cooked capture
Internet Protocol Version 4, Src: 192.168.29.5, Dst: 192.168.29.5
Transmission Control Protocol, Src Port: 42738, Dst Port: 8443, Seq: 205, Ack: 3516, Len: 0
    Source Port: 42738
    Destination Port: 8443
    (Stream index: 94)
    (TCP Segment Len: 0)
    Sequence number: 205    (relative sequence number)
    (Next sequence number: 205    (relative sequence number))
    Acknowledgment number: 3516    (relative ack number)
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window

Fs79

Ich habe jetzt auf zigbee2mqtt umgestellt.
Kann also leider kurzfristig keine Daten liefern.

Hatte mir das ganze im Netzwerk auch mal angeschaut und bin aus diesen ganzen FINs nicht schlau geworden.
Verstehe leider auch zu wenig von WebSocket Verbindungen.

pjakobs

Zitat von: Fs79 am 09 Oktober 2020, 19:01:59
Ich habe jetzt auf zigbee2mqtt umgestellt.
Kann also leider kurzfristig keine Daten liefern.

Hatte mir das ganze im Netzwerk auch mal angeschaut und bin aus diesen ganzen FINs nicht schlau geworden.
Verstehe leider auch zu wenig von WebSocket Verbindungen.

ja, ich kann auch bei längerer Berachtung nicht wirklich ein Muster finden, wann die Verbindung geschlossen wird.
vertrackt.

pj

pjakobs

ich habe versuchshalber das HUEBridge Modul mal so geändert, dass es bei einer Message mit len=0 die Verbindung nicht neu aufbaut, sondern einfach eine halbe Sekunde wartet, damit das System nicth sofort im Chaos versinkt.

Vielleicht kann sich jemand das mal ansehen, der das websocket protokoll besser versteht.
Ich sehe zwei Dinge:
- einen lang lebenden Websocket auf Port 8443, der auch soweit prima funktioniert, aber auschließlich die Updates von deCONZ an fhem enthält, keine Requests von fhem.
- viele viele kurze tcp Verbindungen, die die requests von fhem und die Antworten darauf enthalten .

der websocket wird um 11:16:54 von deCONZ beendet (Paket 86541) und danach nicht wieder aufgebaut. (klar, denn ich habe das "close" rausgenommen, also gibt es scheinbar keinen Grund, ihn wieder zu öffnen)

Ich habe zwei Fragen:
1. warum gehen alle Requests über "normale" tcp connections, nicht über den offenen websocket?
2. was triggert deCONZ, den websocket zu schließen?

pj

edit: hätte ich vorher in die dconz api dokumentation gesehen, ich hätte mir (1) schon beantworten können. Der Websocket wird nur für asynchrone notifications genutzt. Bleibt die Frage, warum deCONZ den Socket dann schließt.

Fs79

Kurzes Update von mir.
Nutze zigbee2mqtt im Docker Container mit dem ConBee2 Stick.
Läuft stabil und melde auch sehr schnell die Statusänderungen.
Zigbee2mqtt hat auch ein Webinterface seit neuestem welches gute Infos bereitstellt.

Ich werde nicht zurück auf deconz wechseln.

TL60

Moin, kannst du mal nähere Angaben zu dem neuen Webinterface machen. Link, oder ähnliches. Danke im Voraus.
Gruß Thomas


TL60

Danke,
Kannte ich noch nicht, schau Ich mir mal genauer an  :) :)
Gruß Thomas


hyper2910

Cubietruck mit FHEM, CUL V3 443MHz, 2 x CULV3 868MHz, Milights, Max Heizungssteuerung, Homematic, IT,

justme1968

das eigentliche problem in dem es hier im thread ging sollte eigentlich mit einem der letzten HUBridge updates erledigt sein.

hue, tradfri, alexa-fhem, homebridge-fhem, LightScene, readingsGroup, ...

https://github.com/sponsors/justme-1968

hyper2910

mmmh,  schade,  ich habe eine ähnliches Problem,  DECONZ/Phoscon läuft sauber und ich kann alle Lampen schalten, die Bewegungsmelder zeigen "Motion" direkt an. 

Nur kommt bei FHEM manchmal nichts an und nichts reagiert wenn aus FHEM ein Befehl abgesetzt wird.

Zur gleichen Zeit in PHOSON alles super



keine Ahnung, wo ich suchen soll!

Cubietruck mit FHEM, CUL V3 443MHz, 2 x CULV3 868MHz, Milights, Max Heizungssteuerung, Homematic, IT,

justme1968

und wie kommst du darauf das es irgendetwas mit diesem thread zu tun hat?

bitte mit verbose 5 im log schauen was fhem macht
hue, tradfri, alexa-fhem, homebridge-fhem, LightScene, readingsGroup, ...

https://github.com/sponsors/justme-1968