zoukankan      html  css  js  c++  java
  • 18.7.3 检测半打开连接

    18.7.3  检测半打开连接
    
    
    如果一方已经关闭或者异常终止连接而另一方却还不知道,我们将这样的TCP连接成为半打开的。
    
    任何一端的主机异常都可能导致发生这种情况,只要不打算在半打开连接上传输数据,
    
    扔处于连接状态的一方就不会检测另一方已经出现异常
    
    node1:/root/test#tcpdump -i eth1 '((tcp) and ( (  host 192.168.137.3)))'
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
    
    
    00:29:44.579714 IP node1.58001 > node2.discard: Flags [S], seq 4069725600, win 14600, options [mss 1460,sackOK,TS val 12799610 ecr 0,nop,wscale 6], length 0
    00:29:44.581724 IP node2.discard > node1.58001: Flags [S.], seq 682751229, ack 4069725601, win 14480, options [mss 1460,sackOK,TS val 116893883 ecr 12799610,nop,wscale 7], length 0
    00:29:44.581779 IP node1.58001 > node2.discard: Flags [.], ack 1, win 229, options [nop,nop,TS val 12799612 ecr 116893883], length 0
    00:29:47.145033 IP 192.168.137.1.55582 > node2.ssh: Flags [P.], seq 3491907355:3491907391, ack 2317960111, win 16425, length 36
    00:29:47.145069 IP node2.ssh > 192.168.137.1.55582: Flags [.], ack 36, win 145, length 0
    
    
    00:30:03.816344 IP 192.168.137.1.55972 > node2.ssh: Flags [P.], seq 102175961:102175997, ack 3143807591, win 16425, length 36
    00:30:03.816364 IP node2.ssh > 192.168.137.1.55972: Flags [.], ack 36, win 175, length 0
    00:30:05.885840 IP 192.168.137.1.55881 > node2.ssh: Flags [P.], seq 761658358:761658394, ack 3173805010, win 16119, length 36
    00:30:05.885852 IP node2.ssh > 192.168.137.1.55881: Flags [.], ack 36, win 155, length 0
    00:30:19.726826 IP 192.168.137.1.55582 > node2.ssh: Flags [P.], seq 36:88, ack 1, win 16425, length 52
    00:30:19.727077 IP node2.ssh > 192.168.137.1.55582: Flags [.], ack 88, win 145, length 0
    00:30:19.729197 IP node2.ssh > 192.168.137.1.55582: Flags [P.], seq 1:133, ack 88, win 145, length 132
    00:30:19.748949 IP node2.ssh > 192.168.137.1.55582: Flags [P.], seq 133:249, ack 88, win 145, length 116
    00:30:19.749166 IP 192.168.137.1.55582 > node2.ssh: Flags [.], ack 249, win 16363, length 0
    00:30:19.990986 IP 192.168.137.1.55582 > node2.ssh: Flags [P.], seq 88:140, ack 249, win 16363, length 52
    00:30:19.992849 IP node2.ssh > 192.168.137.1.55582: Flags [P.], seq 249:301, ack 140, win 145, length 52
    00:30:20.142911 IP 192.168.137.1.55582 > node2.ssh: Flags [P.], seq 140:192, ack 301, win 16350, length 52
    00:30:20.145969 IP node2.ssh > 192.168.137.1.55582: Flags [P.], seq 301:353, ack 192, win 145, length 52
    00:30:20.307517 IP 192.168.137.1.55582 > node2.ssh: Flags [P.], seq 192:244, ack 353, win 16337, length 52
    00:30:20.310981 IP node2.ssh > 192.168.137.1.55582: Flags [P.], seq 353:405, ack 244, win 145, length 52
    00:30:20.374872 IP 192.168.137.1.55582 > node2.ssh: Flags [P.], seq 244:296, ack 405, win 16324, length 52
    00:30:20.376401 IP node2.ssh > 192.168.137.1.55582: Flags [P.], seq 405:457, ack 296, win 145, length 52
    00:30:20.504175 IP 192.168.137.1.55582 > node2.ssh: Flags [P.], seq 296:348, ack 457, win 16311, length 52
    00:30:20.507394 IP node2.ssh > 192.168.137.1.55582: Flags [P.], seq 457:509, ack 348, win 145, length 52
    00:30:20.706140 IP 192.168.137.1.55582 > node2.ssh: Flags [.], ack 509, win 16298, length 0
    00:30:20.708090 IP 192.168.137.1.55582 > node2.ssh: Flags [P.], seq 348:400, ack 509, win 16298, length 52
    00:30:20.709273 IP node2.ssh > 192.168.137.1.55582: Flags [P.], seq 509:561, ack 400, win 145, length 52
    00:30:20.906934 IP 192.168.137.1.55582 > node2.ssh: Flags [.], ack 561, win 16285, length 0
    00:30:20.913041 IP 192.168.137.1.55582 > node2.ssh: Flags [P.], seq 400:452, ack 561, win 16285, length 52
    00:30:20.918790 IP node2.ssh > 192.168.137.1.55582: Flags [P.], seq 561:613, ack 452, win 145, length 52
    00:30:20.953858 IP node2.ssh > 192.168.137.1.55582: Flags [P.], seq 613:681, ack 452, win 145, length 68
    00:30:20.954371 IP 192.168.137.1.55582 > node2.ssh: Flags [.], ack 681, win 16255, length 0
    00:30:22.988827 IP node2.ssh > 192.168.137.1.55881: Flags [F.], seq 1, ack 36, win 155, length 0
    00:30:22.988837 IP 192.168.137.1.55881 > node2.ssh: Flags [.], ack 2, win 16119, length 0
    00:30:22.991399 IP 192.168.137.1.55881 > node2.ssh: Flags [F.], seq 36, ack 2, win 16119, length 0
    00:30:22.991530 IP node2.ssh > 192.168.137.1.55881: Flags [.], ack 37, win 155, length 0
    00:30:23.005079 IP node2.ssh > 192.168.137.1.55972: Flags [F.], seq 1, ack 36, win 175, length 0
    00:30:23.005085 IP 192.168.137.1.55972 > node2.ssh: Flags [.], ack 2, win 16425, length 0
    00:30:23.005086 IP node2.ssh > 192.168.137.1.55582: Flags [F.], seq 681, ack 452, win 145, length 0
    00:30:23.005087 IP 192.168.137.1.55582 > node2.ssh: Flags [.], ack 682, win 16255, length 0
    00:30:23.005089 IP 192.168.137.1.55582 > node2.ssh: Flags [F.], seq 452, ack 682, win 16255, length 0
    00:30:23.007392 IP node2.ssh > 192.168.137.1.55582: Flags [.], ack 453, win 145, length 0
    00:30:23.013601 IP 192.168.137.1.55972 > node2.ssh: Flags [F.], seq 36, ack 2, win 16425, length 0
    00:30:23.013609 IP node2.ssh > 192.168.137.1.55972: Flags [.], ack 37, win 175, length 0
    00:31:02.570247 IP node1.58001 > node2.discard: Flags [P.], seq 1:5, ack 1, win 229, options [nop,nop,TS val 12877601 ecr 116893883], length 4
    00:31:02.582680 IP node2.discard > node1.58001: Flags [R], seq 682751230, win 0, length 0
  • 相关阅读:
    FileUpload1上传控件
    docker如何push镜像到docker hub个人的仓库
    docker的ubuntu镜像无ifconfig和ping命令
    keystone同步数据库的时候提示error
    openstack安装dashboard后访问horizon出错 500 or 504
    装了ubuntu之后,只能进入ubuntu系统,不能进入windows系统
    Kernal Panic
    无法获得锁 /var/lib/dpkg/lock -open
    用户 'NT AUTHORITYIUSR' 登录失败
    配置错误:不能在此路径中使用此配置节。
  • 原文地址:https://www.cnblogs.com/hzcya1995/p/13348554.html
Copyright © 2011-2022 走看看