Cant access internal resources when using pfsense squid?
-
Anyone know why when I have my browser use pfsense squid, i cant access some server resources (websites) on some virtual machines I have. but when I use socks or squid on my synology diskstation, I can access those resources?
Actually let me clarify,
I can access with pfsense squid:
http://192.168.1.48:8081/ = (gitlab)
http://192.168.1.52:32400/web/index.html (plex)But I can not access with pfsense squid:
http://192.168.1.51:8081/home/ (sickrage)
http://192.168.1.51:5050/ (couchpotato)These are all virtual machines on esxi. I think something is wrong with .51 .. for some reason
but I can access these resources if I dont use pfsense squid and just direct to the same pfsense gateway
-
heres a packet capture
00:57:24.750994 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 480: (tos 0x0, ttl 64, id 3868, offset 0, flags [DF], proto TCP (6), length 466) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [P.], cksum 0x3aea (correct), seq 1342775399:1342775813, ack 324322657, win 520, options [nop,nop,TS val 1824512 ecr 51839338], length 414 00:57:24.770881 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62929, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xd66d (correct), seq 1:1449, ack 414, win 302, options [nop,nop,TS val 51843702 ecr 1824512], length 1448 00:57:24.770916 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 18598, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0x3562 (correct), seq 414, ack 1449, win 509, options [nop,nop,TS val 1824532 ecr 51843702], length 0 00:57:24.770920 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62930, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xfff6 (correct), seq 1449:2897, ack 414, win 302, options [nop,nop,TS val 51843702 ecr 1824512], length 1448 00:57:24.770940 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 25118, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0x2fba (correct), seq 414, ack 2897, win 509, options [nop,nop,TS val 1824532 ecr 51843702], length 0 00:57:24.770943 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62931, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0x641c (correct), seq 2897:4345, ack 414, win 302, options [nop,nop,TS val 51843702 ecr 1824512], length 1448 00:57:24.770962 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 40654, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0x2a1e (correct), seq 414, ack 4345, win 497, options [nop,nop,TS val 1824532 ecr 51843702], length 0 00:57:24.770965 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62932, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xf174 (correct), seq 4345:5793, ack 414, win 302, options [nop,nop,TS val 51843702 ecr 1824512], length 1448 00:57:24.770984 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 28903, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0x2481 (correct), seq 414, ack 5793, win 486, options [nop,nop,TS val 1824532 ecr 51843702], length 0 00:57:24.770986 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62933, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0x1f8d (correct), seq 5793:7241, ack 414, win 302, options [nop,nop,TS val 51843702 ecr 1824512], length 1448 00:57:24.771005 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 51911, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0x1ee4 (correct), seq 414, ack 7241, win 475, options [nop,nop,TS val 1824532 ecr 51843702], length 0 00:57:24.771008 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1136: (tos 0x0, ttl 64, id 62934, offset 0, flags [DF], proto TCP (6), length 1122) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [P.], cksum 0xa2b8 (correct), seq 7241:8311, ack 414, win 302, options [nop,nop,TS val 51843702 ecr 1824512], length 1070 00:57:24.771026 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 64388, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0x1abf (correct), seq 414, ack 8311, win 466, options [nop,nop,TS val 1824532 ecr 51843702], length 0 00:57:25.307334 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 486: (tos 0x0, ttl 64, id 13698, offset 0, flags [DF], proto TCP (6), length 472) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [P.], cksum 0x64aa (correct), seq 414:834, ack 8311, win 520, options [nop,nop,TS val 1825069 ecr 51843702], length 420 00:57:25.310517 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 53816, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.1.13627 > 192.168.1.51.8081: Flags [s], cksum 0xb995 (correct), seq 4093307397, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 1825072 ecr 0], length 0 00:57:25.310646 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.51.8081 > 192.168.1.1.13627: Flags [S.], cksum 0xfc1c (correct), seq 963771278, ack 4093307398, win 28960, options [mss 1460,sackOK,TS val 51843837 ecr 1825072,nop,wscale 7], length 0 00:57:25.310682 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 11822, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.13627 > 192.168.1.51.8081: Flags [.], cksum 0x9a01 (correct), seq 1, ack 1, win 520, options [nop,nop,TS val 1825072 ecr 51843837], length 0 00:57:25.310742 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 480: (tos 0x0, ttl 64, id 407, offset 0, flags [DF], proto TCP (6), length 466) 192.168.1.1.13627 > 192.168.1.51.8081: Flags [P.], cksum 0xe980 (correct), seq 1:415, ack 1, win 520, options [nop,nop,TS val 1825072 ecr 51843837], length 414 00:57:25.310847 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 59762, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.51.8081 > 192.168.1.1.13627: Flags [.], cksum 0x9980 (correct), seq 1, ack 415, win 235, options [nop,nop,TS val 51843837 ecr 1825072], length 0 00:57:25.312136 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62935, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xf84c (correct), seq 8311:9759, ack 834, win 310, options [nop,nop,TS val 51843837 ecr 1825069], length 1448 00:57:25.312165 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 23514, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0x10a3 (correct), seq 834, ack 9759, win 509, options [nop,nop,TS val 1825074 ecr 51843837], length 0 00:57:25.312168 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62936, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xd0de (correct), seq 9759:11207, ack 834, win 310, options [nop,nop,TS val 51843837 ecr 1825069], length 1448 00:57:25.312189 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 22706, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0x0afb (correct), seq 834, ack 11207, win 509, options [nop,nop,TS val 1825074 ecr 51843837], length 0 00:57:25.312191 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62937, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xb43b (correct), seq 11207:12655, ack 834, win 310, options [nop,nop,TS val 51843837 ecr 1825069], length 1448 00:57:25.312210 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 50732, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0x055f (correct), seq 834, ack 12655, win 497, options [nop,nop,TS val 1825074 ecr 51843837], length 0 00:57:25.312213 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62938, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0x7d69 (correct), seq 12655:14103, ack 834, win 310, options [nop,nop,TS val 51843837 ecr 1825069], length 1448 00:57:25.312231 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 41496, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xffc1 (correct), seq 834, ack 14103, win 486, options [nop,nop,TS val 1825074 ecr 51843837], length 0 00:57:25.312234 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62939, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xa168 (correct), seq 14103:15551, ack 834, win 310, options [nop,nop,TS val 51843837 ecr 1825069], length 1448 00:57:25.312253 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 634, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xfa24 (correct), seq 834, ack 15551, win 475, options [nop,nop,TS val 1825074 ecr 51843837], length 0 00:57:25.312255 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62940, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xb72c (correct), seq 15551:16999, ack 834, win 310, options [nop,nop,TS val 51843837 ecr 1825069], length 1448 00:57:25.312273 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 43965, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xf488 (correct), seq 834, ack 16999, win 463, options [nop,nop,TS val 1825074 ecr 51843837], length 0 00:57:25.312276 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62941, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0x089c (correct), seq 16999:18447, ack 834, win 310, options [nop,nop,TS val 51843837 ecr 1825069], length 1448 00:57:25.312295 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 44258, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xeeeb (correct), seq 834, ack 18447, win 452, options [nop,nop,TS val 1825074 ecr 51843837], length 0 00:57:25.312297 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1371: (tos 0x0, ttl 64, id 62942, offset 0, flags [DF], proto TCP (6), length 1357) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [P.], cksum 0x362b (correct), seq 18447:19752, ack 834, win 310, options [nop,nop,TS val 51843837 ecr 1825069], length 1305 00:57:25.312316 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 26218, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xe9dc (correct), seq 834, ack 19752, win 442, options [nop,nop,TS val 1825074 ecr 51843837], length 0 00:57:25.314844 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62943, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0x12d3 (correct), seq 19752:21200, ack 834, win 310, options [nop,nop,TS val 51843838 ecr 1825074], length 1448 00:57:25.314871 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 10105, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xe3ee (correct), seq 834, ack 21200, win 509, options [nop,nop,TS val 1825076 ecr 51843838], length 0 00:57:25.314875 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62944, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xf0ad (correct), seq 21200:22648, ack 834, win 310, options [nop,nop,TS val 51843838 ecr 1825074], length 1448 00:57:25.314894 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 36807, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xde46 (correct), seq 834, ack 22648, win 509, options [nop,nop,TS val 1825076 ecr 51843838], length 0 00:57:25.314897 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62945, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xe54f (correct), seq 22648:24096, ack 834, win 310, options [nop,nop,TS val 51843838 ecr 1825074], length 1448 00:57:25.314918 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 61745, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xd89e (correct), seq 834, ack 24096, win 509, options [nop,nop,TS val 1825076 ecr 51843838], length 0 00:57:25.314922 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62946, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xe0c7 (correct), seq 24096:25544, ack 834, win 310, options [nop,nop,TS val 51843838 ecr 1825074], length 1448 00:57:25.314942 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 58727, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xd302 (correct), seq 834, ack 25544, win 497, options [nop,nop,TS val 1825076 ecr 51843838], length 0 00:57:25.314954 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 62947, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [.], cksum 0xbd3a (correct), seq 25544:26992, ack 834, win 310, options [nop,nop,TS val 51843838 ecr 1825074], length 1448 00:57:25.314976 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 59503, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xcd4e (correct), seq 834, ack 26992, win 509, options [nop,nop,TS val 1825076 ecr 51843838], length 0 00:57:25.314979 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 641: (tos 0x0, ttl 64, id 62948, offset 0, flags [DF], proto TCP (6), length 627) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [P.], cksum 0x19ca (correct), seq 26992:27567, ack 834, win 310, options [nop,nop,TS val 51843838 ecr 1825074], length 575 00:57:25.315000 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 62078, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xcb09 (correct), seq 834, ack 27567, win 515, options [nop,nop,TS val 1825076 ecr 51843838], length 0 00:57:25.315334 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 970: (tos 0x0, ttl 64, id 62949, offset 0, flags [DF], proto TCP (6), length 956) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [P.], cksum 0x8891 (correct), seq 27567:28471, ack 834, win 310, options [nop,nop,TS val 51843838 ecr 1825076], length 904 00:57:25.315360 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 38647, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xc782 (correct), seq 834, ack 28471, win 513, options [nop,nop,TS val 1825077 ecr 51843838], length 0 00:57:25.315362 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 76: (tos 0x0, ttl 64, id 62950, offset 0, flags [DF], proto TCP (6), length 62) 192.168.1.51.8081 > 192.168.1.1.24351: Flags [P.], cksum 0x5e92 (correct), seq 28471:28481, ack 834, win 310, options [nop,nop,TS val 51843838 ecr 1825076], length 10 00:57:25.315381 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 51551, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.24351 > 192.168.1.51.8081: Flags [.], cksum 0xc771 (correct), seq 834, ack 28481, win 520, options [nop,nop,TS val 1825077 ecr 51843838], length 0 00:57:25.316076 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 770: (tos 0x0, ttl 64, id 59763, offset 0, flags [DF], proto TCP (6), length 756) 192.168.1.51.8081 > 192.168.1.1.13627: Flags [P.], cksum 0x2ca8 (correct), seq 1:705, ack 415, win 235, options [nop,nop,TS val 51843838 ecr 1825072], length 704 00:57:25.316102 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 49289, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.13627 > 192.168.1.51.8081: Flags [.], cksum 0x95a2 (correct), seq 415, ack 705, win 514, options [nop,nop,TS val 1825078 ecr 51843838], length 0 00:57:25.316195 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 76: (tos 0x0, ttl 64, id 59764, offset 0, flags [DF], proto TCP (6), length 62) 192.168.1.51.8081 > 192.168.1.1.13627: Flags [P.], cksum 0x156b (correct), seq 705:715, ack 415, win 235, options [nop,nop,TS val 51843838 ecr 1825072], length 10 00:57:25.316216 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 25435, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.13627 > 192.168.1.51.8081: Flags [.], cksum 0x9592 (correct), seq 415, ack 715, win 520, options [nop,nop,TS val 1825078 ecr 51843838], length 0 00:57:25.365549 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 53216, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.1.45682 > 192.168.1.51.8081: Flags [s], cksum 0x5126 (correct), seq 591504832, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 1825127 ecr 0], length 0 00:57:25.365737 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.51.8081 > 192.168.1.1.45682: Flags [S.], cksum 0x0214 (correct), seq 765892837, ack 591504833, win 28960, options [mss 1460,sackOK,TS val 51843851 ecr 1825127,nop,wscale 7], length 0 00:57:25.365780 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 43388, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.45682 > 192.168.1.51.8081: Flags [.], cksum 0x9ff8 (correct), seq 1, ack 1, win 520, options [nop,nop,TS val 1825127 ecr 51843851], length 0 00:57:25.365970 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 38892, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.1.1581 > 192.168.1.51.8081: Flags [s], cksum 0xe29d (correct), seq 1534298204, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 1825127 ecr 0], length 0 00:57:25.366086 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.51.8081 > 192.168.1.1.1581: Flags [S.], cksum 0xa0fc (correct), seq 2064334351, ack 1534298205, win 28960, options [mss 1460,sackOK,TS val 51843851 ecr 1825127,nop,wscale 7], length 0 00:57:25.366117 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 60553, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.1581 > 192.168.1.51.8081: Flags [.], cksum 0x3ee0 (correct), seq 1, ack 1, win 520, options [nop,nop,TS val 1825128 ecr 51843851], length 0 00:57:25.366180 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 32272, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [s], cksum 0x35f4 (correct), seq 2228326555, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 1825128 ecr 0], length 0 00:57:25.366217 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 500: (tos 0x0, ttl 64, id 33353, offset 0, flags [DF], proto TCP (6), length 486) 192.168.1.1.45682 > 192.168.1.51.8081: Flags [P.], cksum 0xda4c (correct), seq 1:435, ack 1, win 520, options [nop,nop,TS val 1825128 ecr 51843851], length 434 00:57:25.366279 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [S.], cksum 0x017c (correct), seq 338466757, ack 2228326556, win 28960, options [mss 1460,sackOK,TS val 51843851 ecr 1825128,nop,wscale 7], length 0 00:57:25.366311 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 27599, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x9f60 (correct), seq 1, ack 1, win 520, options [nop,nop,TS val 1825128 ecr 51843851], length 0 00:57:25.366324 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 35821, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.51.8081 > 192.168.1.1.45682: Flags [.], cksum 0x9f62 (correct), seq 1, ack 435, win 235, options [nop,nop,TS val 51843851 ecr 1825128], length 0 00:57:25.366336 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 498: (tos 0x0, ttl 64, id 8301, offset 0, flags [DF], proto TCP (6), length 484) 192.168.1.1.1581 > 192.168.1.51.8081: Flags [P.], cksum 0xf85f (correct), seq 1:433, ack 1, win 520, options [nop,nop,TS val 1825128 ecr 51843851], length 432 00:57:25.366462 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 11547, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.51.8081 > 192.168.1.1.1581: Flags [.], cksum 0x3e4d (correct), seq 1, ack 433, win 235, options [nop,nop,TS val 51843851 ecr 1825128], length 0 00:57:25.366593 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 32745, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [s], cksum 0x70dc (correct), seq 1531073341, win 65228, options [mss 1460,nop,wscale 7,sackOK,TS val 1825128 ecr 0], length 0 00:57:25.366641 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 478: (tos 0x0, ttl 64, id 36170, offset 0, flags [DF], proto TCP (6), length 464) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [P.], cksum 0x5d47 (correct), seq 1:413, ack 1, win 520, options [nop,nop,TS val 1825128 ecr 51843851], length 412 00:57:25.366678 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [S.], cksum 0x95a0 (correct), seq 3741807533, ack 1531073342, win 28960, options [mss 1460,sackOK,TS val 51843851 ecr 1825128,nop,wscale 7], length 0 00:57:25.366710 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 29247, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x3385 (correct), seq 1, ack 1, win 520, options [nop,nop,TS val 1825128 ecr 51843851], length 0 00:57:25.366772 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 33997, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [.], cksum 0x9ee1 (correct), seq 1, ack 413, win 235, options [nop,nop,TS val 51843851 ecr 1825128], length 0 00:57:25.366793 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 477: (tos 0x0, ttl 64, id 51468, offset 0, flags [DF], proto TCP (6), length 463) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [P.], cksum 0x10dd (correct), seq 1:412, ack 1, win 520, options [nop,nop,TS val 1825128 ecr 51843851], length 411 00:57:25.366909 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 24741, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [.], cksum 0x3307 (correct), seq 1, ack 412, win 235, options [nop,nop,TS val 51843851 ecr 1825128], length 0 00:57:25.367759 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 11548, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.1581: Flags [.], cksum 0x5401 (correct), seq 1:1449, ack 433, win 235, options [nop,nop,TS val 51843851 ecr 1825128], length 1448 00:57:25.367787 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 62308, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.1581 > 192.168.1.51.8081: Flags [.], cksum 0x3792 (correct), seq 433, ack 1449, win 509, options [nop,nop,TS val 1825129 ecr 51843851], length 0 00:57:25.367790 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1154: (tos 0x0, ttl 64, id 11549, offset 0, flags [DF], proto TCP (6), length 1140) 192.168.1.51.8081 > 192.168.1.1.1581: Flags [P.], cksum 0x26ee (correct), seq 1449:2537, ack 433, win 235, options [nop,nop,TS val 51843851 ecr 1825128], length 1088 00:57:25.367810 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 22021, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.1581 > 192.168.1.51.8081: Flags [.], cksum 0x3350 (correct), seq 433, ack 2537, win 511, options [nop,nop,TS val 1825129 ecr 51843851], length 0 00:57:25.367839 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 76: (tos 0x0, ttl 64, id 11550, offset 0, flags [DF], proto TCP (6), length 62) 192.168.1.51.8081 > 192.168.1.1.1581: Flags [P.], cksum 0x5454 (correct), seq 2537:2547, ack 433, win 235, options [nop,nop,TS val 51843851 ecr 1825128], length 10 00:57:25.367859 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 47019, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.1581 > 192.168.1.51.8081: Flags [.], cksum 0x3346 (correct), seq 433, ack 2547, win 511, options [nop,nop,TS val 1825129 ecr 51843851], length 0 00:57:25.371329 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 33998, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [.], cksum 0x5cee (correct), seq 1:1449, ack 413, win 235, options [nop,nop,TS val 51843852 ecr 1825128], length 1448 00:57:25.371356 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 1321, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x9821 (correct), seq 413, ack 1449, win 509, options [nop,nop,TS val 1825133 ecr 51843852], length 0 00:57:25.371359 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 33999, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [.], cksum 0x012b (correct), seq 1449:2897, ack 413, win 235, options [nop,nop,TS val 51843852 ecr 1825128], length 1448 00:57:25.371379 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 41430, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x9279 (correct), seq 413, ack 2897, win 509, options [nop,nop,TS val 1825133 ecr 51843852], length 0 00:57:25.371382 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 34000, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [.], cksum 0x1099 (correct), seq 2897:4345, ack 413, win 235, options [nop,nop,TS val 51843852 ecr 1825128], length 1448 00:57:25.371401 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 54032, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x8cdd (correct), seq 413, ack 4345, win 497, options [nop,nop,TS val 1825133 ecr 51843852], length 0 00:57:25.371404 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 34001, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [.], cksum 0xedf6 (correct), seq 4345:5793, ack 413, win 235, options [nop,nop,TS val 51843852 ecr 1825128], length 1448 00:57:25.371423 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 50631, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x8740 (correct), seq 413, ack 5793, win 486, options [nop,nop,TS val 1825133 ecr 51843852], length 0 00:57:25.371426 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 34002, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [.], cksum 0x3e9a (correct), seq 5793:7241, ack 413, win 235, options [nop,nop,TS val 51843852 ecr 1825128], length 1448 00:57:25.371444 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 41699, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x81a3 (correct), seq 413, ack 7241, win 475, options [nop,nop,TS val 1825133 ecr 51843852], length 0 00:57:25.371447 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 34003, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [.], cksum 0x47ca (correct), seq 7241:8689, ack 413, win 235, options [nop,nop,TS val 51843852 ecr 1825128], length 1448 00:57:25.371465 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 65491, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x7c07 (correct), seq 413, ack 8689, win 463, options [nop,nop,TS val 1825133 ecr 51843852], length 0 00:57:25.371468 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 34004, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [.], cksum 0x296c (correct), seq 8689:10137, ack 413, win 235, options [nop,nop,TS val 51843852 ecr 1825128], length 1448 00:57:25.371487 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 5326, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x766a (correct), seq 413, ack 10137, win 452, options [nop,nop,TS val 1825133 ecr 51843852], length 0 00:57:25.371490 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 34005, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [.], cksum 0xe89f (correct), seq 10137:11585, ack 413, win 235, options [nop,nop,TS val 51843852 ecr 1825128], length 1448 00:57:25.371508 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 54010, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x70cd (correct), seq 413, ack 11585, win 441, options [nop,nop,TS val 1825133 ecr 51843852], length 0 00:57:25.371514 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 210: (tos 0x0, ttl 64, id 34006, offset 0, flags [DF], proto TCP (6), length 196) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [P.], cksum 0xa43e (correct), seq 11585:11729, ack 413, win 235, options [nop,nop,TS val 51843852 ecr 1825128], length 144 00:57:25.371534 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 29765, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x7011 (correct), seq 413, ack 11729, win 485, options [nop,nop,TS val 1825133 ecr 51843852], length 0 00:57:25.371537 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 328: (tos 0x0, ttl 64, id 34007, offset 0, flags [DF], proto TCP (6), length 314) 192.168.1.51.8081 > 192.168.1.1.33080: Flags [P.], cksum 0x94d1 (correct), seq 11729:11991, ack 413, win 235, options [nop,nop,TS val 51843852 ecr 1825133], length 262 00:57:25.371556 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 61365, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.33080 > 192.168.1.51.8081: Flags [.], cksum 0x6eea (correct), seq 413, ack 11991, win 518, options [nop,nop,TS val 1825133 ecr 51843852], length 0 00:57:25.374809 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 24742, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [.], cksum 0xf6c5 (correct), seq 1:1449, ack 412, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.374836 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 59090, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x2c43 (correct), seq 412, ack 1449, win 509, options [nop,nop,TS val 1825136 ecr 51843853], length 0 00:57:25.374839 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 24743, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [.], cksum 0x12d8 (correct), seq 1449:2897, ack 412, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.374861 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 41205, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x269b (correct), seq 412, ack 2897, win 509, options [nop,nop,TS val 1825136 ecr 51843853], length 0 00:57:25.374864 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 24744, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [.], cksum 0x3eec (correct), seq 2897:4345, ack 412, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.374883 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 46474, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x20ff (correct), seq 412, ack 4345, win 497, options [nop,nop,TS val 1825136 ecr 51843853], length 0 00:57:25.374886 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 24745, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [.], cksum 0x2545 (correct), seq 4345:5793, ack 412, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.374905 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 29575, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x1b62 (correct), seq 412, ack 5793, win 486, options [nop,nop,TS val 1825136 ecr 51843853], length 0 00:57:25.374908 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 24746, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [.], cksum 0x1c45 (correct), seq 5793:7241, ack 412, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.374927 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 28161, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x15c5 (correct), seq 412, ack 7241, win 475, options [nop,nop,TS val 1825136 ecr 51843853], length 0 00:57:25.374930 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 24747, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [.], cksum 0xcefc (correct), seq 7241:8689, ack 412, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.374949 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 21846, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x1029 (correct), seq 412, ack 8689, win 463, options [nop,nop,TS val 1825136 ecr 51843853], length 0 00:57:25.374951 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 24748, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [.], cksum 0x3054 (correct), seq 8689:10137, ack 412, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.374970 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 37853, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x0a8c (correct), seq 412, ack 10137, win 452, options [nop,nop,TS val 1825136 ecr 51843853], length 0 00:57:25.374973 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 24749, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [.], cksum 0x46cc (correct), seq 10137:11585, ack 412, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.374991 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 41824, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x04ef (correct), seq 412, ack 11585, win 441, options [nop,nop,TS val 1825136 ecr 51843853], length 0 00:57:25.374996 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 101: (tos 0x0, ttl 64, id 24750, offset 0, flags [DF], proto TCP (6), length 87) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [P.], cksum 0x298b (correct), seq 11585:11620, ack 412, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 35 00:57:25.375015 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 57235, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x04cd (correct), seq 412, ack 11620, win 440, options [nop,nop,TS val 1825136 ecr 51843853], length 0 00:57:25.375017 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 252: (tos 0x0, ttl 64, id 24751, offset 0, flags [DF], proto TCP (6), length 238) 192.168.1.51.8081 > 192.168.1.1.44349: Flags [P.], cksum 0xb926 (correct), seq 11620:11806, ack 412, win 235, options [nop,nop,TS val 51843853 ecr 1825136], length 186 00:57:25.375036 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 64984, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.44349 > 192.168.1.51.8081: Flags [.], cksum 0x0414 (correct), seq 412, ack 11806, win 439, options [nop,nop,TS val 1825136 ecr 51843853], length 0 00:57:25.376603 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 35822, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.45682: Flags [.], cksum 0x4423 (correct), seq 1:1449, ack 435, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.376630 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 13967, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.45682 > 192.168.1.51.8081: Flags [.], cksum 0x989c (correct), seq 435, ack 1449, win 509, options [nop,nop,TS val 1825138 ecr 51843853], length 0 00:57:25.376633 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 35823, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.45682: Flags [.], cksum 0x9234 (correct), seq 1449:2897, ack 435, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.376653 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 56957, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.45682 > 192.168.1.51.8081: Flags [.], cksum 0x92f4 (correct), seq 435, ack 2897, win 509, options [nop,nop,TS val 1825138 ecr 51843853], length 0 00:57:25.376656 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 35824, offset 0, flags [DF], proto TCP (6), length 1500) 192.168.1.51.8081 > 192.168.1.1.45682: Flags [.], cksum 0x0e9b (correct), seq 2897:4345, ack 435, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 1448 00:57:25.376674 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 60745, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.45682 > 192.168.1.51.8081: Flags [.], cksum 0x8d58 (correct), seq 435, ack 4345, win 497, options [nop,nop,TS val 1825138 ecr 51843853], length 0 00:57:25.376677 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 851: (tos 0x0, ttl 64, id 35825, offset 0, flags [DF], proto TCP (6), length 837) 192.168.1.51.8081 > 192.168.1.1.45682: Flags [P.], cksum 0xf668 (correct), seq 4345:5130, ack 435, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 785 00:57:25.376695 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 47796, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.45682 > 192.168.1.51.8081: Flags [.], cksum 0x8a4d (correct), seq 435, ack 5130, win 491, options [nop,nop,TS val 1825138 ecr 51843853], length 0 00:57:25.376698 00:0c:29:05:12:e4 > 00:25:90:cb:5d:68, ethertype IPv4 (0x0800), length 76: (tos 0x0, ttl 64, id 35826, offset 0, flags [DF], proto TCP (6), length 62) 192.168.1.51.8081 > 192.168.1.1.45682: Flags [P.], cksum 0xa20a (correct), seq 5130:5140, ack 435, win 235, options [nop,nop,TS val 51843853 ecr 1825128], length 10 00:57:25.376716 00:25:90:cb:5d:68 > 00:0c:29:05:12:e4, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 47989, offset 0, flags [DF], proto TCP (6), length 52) 192.168.1.1.45682 > 192.168.1.51.8081: Flags [.], cksum 0x8a43 (correct), seq 435, ack 5140, win 491, options [nop,nop,TS val 1825138 ecr 51843853], length 0 [/s][/s][/s][/s][/s]
-
Do you have your client set to bypass proxy for internal addresses? That might avoid the problem altogether.
-
@KOM:
Do you have your client set to bypass proxy for internal addresses? That might avoid the problem altogether.
I could but I really want to know why PFSense SQUID has this issue but other SQUID's I use on my internal network (like the Synology DiskStation Proxy Server) do not have the issue
-
pfsense squid access.log when going to http://192.168.1.51:8081/home/
These logs come up then nothing… it stops
1431809714.997 20 192.168.1.5 TCP_MISS/200 8451 GET http://192.168.1.51:8081/home/ - DIRECT/192.168.1.51 text/html 1431809715.141 42 192.168.1.5 TCP_MISS/200 22837 GET http://192.168.1.51:8081/images/ico/favicon.ico - DIRECT/192.168.1.51 image/vnd.microsoft.icon 1431809715.160 61 192.168.1.5 TCP_MISS/200 72968 GET http://192.168.1.51:8081/images/ico/favicon-196.png - DIRECT/192.168.1.51 image/png 1431809715.187 46 192.168.1.5 TCP_MISS/200 51256 GET http://192.168.1.51:8081/images/ico/favicon-160.png - DIRECT/192.168.1.51 image/png 1431809715.189 27 192.168.1.5 TCP_MISS/200 21500 GET http://192.168.1.51:8081/images/ico/favicon-96.png - DIRECT/192.168.1.51 image/png 1431809715.208 19 192.168.1.5 TCP_MISS/200 10956 GET http://192.168.1.51:8081/images/ico/favicon-64.png - DIRECT/192.168.1.51 image/png 1431809715.219 29 192.168.1.5 TCP_MISS/200 3767 GET http://192.168.1.51:8081/images/ico/favicon-32.png - DIRECT/192.168.1.51 image/png 1431809715.220 11 192.168.1.5 TCP_MEM_HIT/200 1834 GET http://192.168.1.51:8081/images/ico/favicon-16.png - DIRECT/192.168.1.51 image/png
-
I had the same problem https://forum.pfsense.org/index.php?topic=93679.msg520471#msg520471
Thanks to Kom helped me out just bypass it better altogether or make a rule to allow and log it.
-
I had the same problem https://forum.pfsense.org/index.php?topic=93679.msg520471#msg520471
Thanks to Kom helped me out just bypass it better altogether or make a rule to allow and log it.
It's not the same. i really think this is a serious issue that should be addressed
If i'm at a remote location, and I use ssh LocalForward localhost:port 192.168.1.1:3128 (pfsense squid) , I can not access some internal resources (as i detailed in this thread) . however if I do ssh LocalForward localhost:port 192.168.1.15:3128 (synology diskstation squid) I can access all internal resources.
I shouldn't be forced to keep around a second squid end point just to get things to work. What if one day I want to remove the synology, or shut it down for maintenance.
The pfsense is the much more concrete equipment out of the two and will stay around much longer
this issue doesnt just happen through a SSH tunnel. when im on my local lan, and i proxy directly to 192.168.1.1:3128, i get the same issue with access internal resources.
the true seriousness of the issue: if i bypass internal resources from my pfsense squid proxy, how can I access them over the ssh tunnel + squid proxy? I cant, and there is the true problem and why I think this is a serious problem
the second crappy part about this is, i've looked at every debug log I can think of and i'm getting zero help from the logs.
i could just use socks for specific resources that dont work with pfsense squid, but i dont like compromises & workarounds, i like things to work
-
hmm..are you running 2.2.2 pfSense?
-
First it could make sense to access even internal servers relying on Squid (running on pfSense or not, this is another debate) however, for internal servers, purpose will be only cache and anti-virus. I don't think you intend to apply access control and filtering for internal servers isn't it? And given the dynamic aspect of even internal servers, does cache really makes sense?
Anyway, this could be part of your plan and this is definitely your decision.
Second point: am I correct guessing that servers you can't access are all running on ports different from standard HTTP/HTTPS port (i.e. 80, 8080 and 443)?
-
hmm..are you running 2.2.2 pfSense?
Yep
2.2.2-RELEASE (amd64)
built on Mon Apr 13 20:10:22 CDT 2015
FreeBSD 10.1-RELEASE-p9with this mobo http://www.supermicro.com/products/motherboard/celeron/x10/x10sba-l.cfm
-
First it could make sense to access even internal servers relying on Squid (running on pfSense or not, this is another debate) however, for internal servers, purpose will be only cache and anti-virus. I don't think you intend to apply access control and filtering for internal servers isn't it? And given the dynamic aspect of even internal servers, does cache really makes sense?
Anyway, this could be part of your plan and this is definitely your decision.
Second point: am I correct guessing that servers you can't access are all running on ports different from standard HTTP/HTTPS port (i.e. 80, 8080 and 443)?
I'll try changing the port to 80/443 and see if it works
-
Also going to try and look at the tornado log files
-
I changed http://192.168.1.51:8081/home/ to http://192.168.1.51:8080/home/ , same issue. PFSense SQUID times out when I try and go to the website. And again SOCKS or Synology SQUID still work fine
-
never was able to figure this one out :'(