[svn.haxx.se] · SVN Dev · SVN Users · SVN Org · TSVN Dev · TSVN Users · Subclipse Dev · Subclipse Users · this month's index

Re: Re: What causes "Connection reset by peer" errors?

From: Matthew Sanderson <matthew_at_formtrap.com>
Date: 2005-07-13 07:30:07 CEST

Hi Klaus,

Some semi-random things I noticed that are curious in the dump you sent:

1. Why does your dump claim there are packets with bad checksums? This
looks like an issue with the TCP/IP stack on either client or server or
both, or maybe incorrect decoding/verification of the checksums by
ethereal, or the network connectivity is *really* bad and that isn't being
corrected at the transport layer (or some other layer) for some reason. I
think this should be investigated.

Could it be that when you access the repository remotely, you do so using
some gateway or firewall or something which you don't use in other
circumstances, and that gateway or whatever is corrupting the packets so
that their checksums don't match?

If you use PPP or a VPN or something when connecting from your 'remote
sites', I would expect that thing to do its own error correction, so the
eventual decapsulated TCP/IP over Ethernet traffic on your LAN that you
captured and emailed should have correct checksums. And it doesn't.

How remote is 'remote'? What's your network topology?

If the checksums are bad too often, it would make sense for the receiving
end's TCP/IP stack to despair and reset the connection.

2. From looking at some Apache 2 source linked from Google's results page
for 'could not get next bucket brigade', it looks like that error is
printed when the DAV module cannot read the client's request data,
probably because the TCP connection was reset. So I think it's just a
symptom of the previous problem, not in itself a problem, so it should be
ignored.

HTH,

--matt

Matthew Sanderson
Senior Programmer (UNIX)
TCG Information Systems Pty Ltd
Sydney, Australia
matthew@formtrap.com
http://www.formtrap.com/
+61 (02) 8303 2407

On Tue, 12 Jul 2005, Klaus Fehlker wrote:

> > --- Ursprüngliche Nachricht ---
> > Von: kfogel@collab.net
> > An: "Klaus Fehlker" <lythie_ng@gmx.net>
> > Kopie: users@subversion.tigris.org
> > Betreff: Re: What causes "Connection reset by peer" errors?
> > Datum: 11 Jul 2005 10:27:33 -0500
> >
> > "Klaus Fehlker" <lythie_ng@gmx.net> writes:
> > > sorry to bother you with this again but i am still stuck. Can somebody
> > say
> > > if this is the right mailing list or is it rather a problem of Apache,
> > or
> > > even our network? As the subject says i have no idea what causes this
> > > "connection reset by peer" error.
> > >
> > > Any hint that brings me further is very much welcome!
> >
> > This is just a wild guess, possibly totally wrong, but have you tried
> > playing with the 'http-timeout' parameter in your
> > ~/.subversion/servers configuration file?
>
> Hm, haven't tried it, yet, but could a bad client configuration make the
> server send Resets?
> What is SVN's usual behavior when the server sends a reset? Do you know what
> can cause a server sending a reset?
>
> Klaus
>
> > > > -----Original Message-----
> > > > From: Klaus Fehlker [mailto:lythie_ng@gmx.net]
> > > > Sent: Mittwoch, 29. Juni 2005 18:13
> > > > To: users@subversion.tigris.org
> > > > Subject: What causes "Connection reset by peer" errors?
> > > >
> > > > Hi,
> > > >
> > > > I have problems using my repository from certain locations. I use
> > Apache
> > > > 2.0.54 with Subversion 1.1.4 on server-side and 1.2.0 on client-side.
> > I
> > > > use
> > > > it from within the LAN as well as from remote sites with a poor
> > network
> > > > connection.
> > > >
> > > > Unfortunately, large commits from the remote site sometimes break with
> > the
> > > > message "Connection reset by peer". The Apache logs tell that the
> > server
> > > > could not get the next buckade brigade - whatever that means?!
> > > >
> > > > I suspect it to be some kind of network error but do not really know
> > how
> > > > to
> > > > make sure. There is no proxy in between.
> > > >
> > > > Below i appended the network traffic dumped with Ethereal
> > (165.72.165.25 =
> > > > server). In frame 236629 the client sents a DELETE
> > *somethingcryptical*
> > > > but
> > > > the commit only consists of adds. Does that have to do with the error?
> > > >
> > > > Many thinks for any help,
> > > > Klaus
> > > >
> > > > From Apache error log:
> > > > [Tue Jun 28 17:05:17 2005] [info] [client 2.33.109.115] Access
> > granted:
> > > > 'kFehlker' PUT
> > > > NPS-Application:/NPS0.1_trunk/infrastructure/tools/TMS-development-
> > > > environment/envdev/eclipse/plugins/org.eclipse.debug.ui_3.0.1/dtui.jar
> > > > [Tue Jun 28 17:05:20 2005] [error] [client 2.33.109.115]
> > (104)Connection
> > > > reset by peer: Could not get next bucket brigade [500, #0]
> > > > [Tue Jun 28 17:05:20 2005] [info] (32)Broken pipe: core_output_filter:
> > > > writing data to the network
> > > > [Tue Jun 28 17:05:20 2005] [debug] mod_auth_ldap.c(337): [client
> > > > 2.33.109.115] [20767] auth_ldap authenticate: using URL
> > > > ldap://ldap.dhl.com:389/o=dhl.com
> > > > [Tue Jun 28 17:05:20 2005] [debug] mod_auth_ldap.c(411): [client
> > > > 2.33.109.115] [20767] auth_ldap authenticate: accepting kFehlker
> > > > [Tue Jun 28 17:05:20 2005] [info] [client 2.33.109.115] Access
> > granted:
> > > > 'kFehlker' DELETE NPS-Application:
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236618 15:50:01.880031 165.72.165.25 2.33.109.115
> > TCP
> > > > http > 4072 [ACK] Seq=1 Ack=507374 Win=30660 Len=0
> > > >
> > > > Frame 236618 (60 bytes on wire, 60 bytes captured)
> > > > Ethernet II, Src: 00:12:80:97:3c:20, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4072
> > (4072),
> > > > Seq: 1, Ack: 507374, Len: 0
> > > > Source port: http (80)
> > > > Destination port: 4072 (4072)
> > > > Sequence number: 1 (relative sequence number)
> > > > Acknowledgement number: 507374 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0010 (ACK)
> > > > Window size: 30660
> > > > Checksum: 0xba62 (correct)
> > > > SEQ/ACK analysis
> > > > This is an ACK to the segment in frame: 236585
> > > > The RTT to ACK the segment was: 0.086843000 seconds
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236619 15:50:01.880230 165.72.165.25 2.33.109.115
> > TCP
> > > > http > 4072 [ACK] Seq=1 Ack=507886 Win=30660 Len=0
> > > >
> > > > Frame 236619 (60 bytes on wire, 60 bytes captured)
> > > > Ethernet II, Src: 00:12:80:97:3c:20, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4072
> > (4072),
> > > > Seq: 1, Ack: 507886, Len: 0
> > > > Source port: http (80)
> > > > Destination port: 4072 (4072)
> > > > Sequence number: 1 (relative sequence number)
> > > > Acknowledgement number: 507886 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0010 (ACK)
> > > > Window size: 30660
> > > > Checksum: 0xb862 (correct)
> > > > SEQ/ACK analysis
> > > > This is an ACK to the segment in frame: 236587
> > > > The RTT to ACK the segment was: 0.084847000 seconds
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236620 15:50:01.880274 2.33.109.115 165.72.165.25
> > HTTP
> > > > Continuation
> > > >
> > > > Frame 236620 (566 bytes on wire, 566 bytes captured)
> > > > Ethernet II, Src: 00:08:02:e4:d8:4f, Dst: 00:00:0c:07:ac:01
> > > > Internet Protocol, Src Addr: 2.33.109.115 (2.33.109.115), Dst Addr:
> > > > 165.72.165.25 (165.72.165.25)
> > > > Transmission Control Protocol, Src Port: 4072 (4072), Dst Port: http
> > (80),
> > > > Seq: 515566, Ack: 1, Len: 512
> > > > Source port: 4072 (4072)
> > > > Destination port: http (80)
> > > > Sequence number: 515566 (relative sequence number)
> > > > Next sequence number: 516078 (relative sequence number)
> > > > Acknowledgement number: 1 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0018 (PSH, ACK)
> > > > Window size: 64240
> > > > Checksum: 0xbc10 (incorrect, should be 0xd63c)
> > > > Hypertext Transfer Protocol
> > > > Data (512 bytes)
> > > >
> > > > 0000 2a 02 7a 78 52 2c 68 6c 12 01 e3 16 35 5e 6d 55
> > *.zxR,hl....5^mU
> > > > 0010 8b 39 af b5 c9 e5 ae 76 08 ff 21 bd 01 e3 90 7d
> > .9.....v..!....}
> > > > 0020 d3 12 8e 11 36 45 0e d4 05 07 ac 43 44 c8 7d 38
> > ....6E.....CD.}8
> > > > 0030 60 0d 47 cd 89 99 52 af 2a 53 e5 6c 5f 96 9b 63
> > `.G...R.*S.l_..c
> > > > 0040 80 9c fd 99 b3 0b db 02 fe 3a 41 69 53 4a b9 f7
> > .........:AiSJ..
> > > > 0050 a6 56 aa 55 1e 35 4e ad b6 8a 00 89 d7 7c bc ea
> > .V.U.5N......|..
> > > > 0060 38 6b b6 fd 7a 1a 3f 29 6d a8 31 75 61 b3 c5 63
> > 8k..z.?)m.1ua..c
> > > > 0070 7b 2b 1e a5 a9 ce 33 f1 58 7e f7 a8 d6 84 45 ea
> > {+....3.X~....E.
> > > > 0080 78 55 c9 42 b1 2e a9 09 dc 79 ac 4b ad b7 cc ed
> > xU.B.....y.K....
> > > > 0090 f2 9a 1a c4 da 5e 75 22 b0 54 3f 50 1b 70 b7 2a
> > .....^u".T?P.p.*
> > > > 00a0 b1 7f 77 5d 7c 23 a6 e9 5c 6b 50 1e db 13 22 56
> > ..w]|#..\kP..."V
> > > > 00b0 03 b2 38 54 d5 54 9f 74 80 ba 93 9f 73 6e 36 79
> > ..8T.T.t....sn6y
> > > > 00c0 02 36 14 50 35 4c d6 5a fe 23 3a bf 3e d4 dd 6c
> > .6.P5L.Z.#:.>..l
> > > > 00d0 97 da cc 85 c9 50 43 03 38 e6 55 75 a2 8f 47 6d
> > .....PC.8.Uu..Gm
> > > > 00e0 51 f5 56 88 17 1b 6c 3a 1b 3d 84 8b ce 0d c6 e6
> > Q.V...l:.=......
> > > > 00f0 01 b5 90 6a 64 80 5b 53 9e 4f eb 38 da a5 22 dc
> > ...jd.[S.O.8..".
> > > > 0100 9d ee 1d 07 9b 3c 2a aa b6 b1 22 04 23 71 ec 4f
> > .....<*...".#q.O
> > > > 0110 b6 b0 df 91 f4 42 62 87 83 0a 45 f8 e2 50 aa 53
> > .....Bb...E..P.S
> > > > 0120 93 c8 e5 58 6e 91 bf da 04 8f 6c a5 12 13 4e e7
> > ...Xn.....l...N.
> > > > 0130 56 4b 9c 57 79 87 c4 29 d3 08 b1 02 ca ea 38 69
> > VK.Wy..)......8i
> > > > 0140 c7 f7 4c 46 4b 5d ac 1a c6 0a 63 ad 77 f2 d1 d6
> > ..LFK]....c.w...
> > > > 0150 9b d5 b9 76 13 db 2c 18 4f 61 ad b3 3e 27 74 e1
> > ...v..,.Oa..>'t.
> > > > 0160 b5 13 99 ae 57 fd 48 9d ef 11 23 d4 05 29 de cc
> > ....W.H...#..)..
> > > > 0170 4a 1a ec 52 17 59 aa 10 b3 16 63 a6 ac eb 21 1c
> > J..R.Y....c...!.
> > > > 0180 fb b1 ba c4 a3 2e 56 97 5a e9 8d 85 bd 35 c0 ab
> > ......V.Z....5..
> > > > 0190 2e 57 19 bc f0 15 ec 0e 20 b1 ee 8d ec eb 2a 42 .W......
> > .....*B
> > > > 01a0 15 a1 c6 9e d2 ed b0 a9 35 ab ab d4 d5 0c e0 1a
> > ........5.......
> > > > 01b0 08 6f 30 82 a4 2e ba c3 ab 76 89 e5 0c ef 3a b8
> > .o0......v....:.
> > > > 01c0 97 60 c4 46 25 d8 60 12 ed 31 dd 06 73 1c a2 dd
> > .`.F%.`..1..s...
> > > > 01d0 a0 7e ca 00 6f 14 54 77 c8 c5 89 2e b2 9d 2e 0f
> > .~..o.Tw........
> > > > 01e0 0a 27 45 ad 37 b3 35 ba 25 c9 1a f1 38 7e 37 9e
> > .'E.7.5.%...8~7.
> > > > 01f0 bd 75 2c ec f8 39 b6 c7 af ec 0d 48 5e c3 a5 6e
> > .u,..9.....H^..n
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236621 15:50:01.880400 2.33.109.115 165.72.165.25
> > HTTP
> > > > Continuation
> > > >
> > > > Frame 236621 (566 bytes on wire, 566 bytes captured)
> > > > Ethernet II, Src: 00:08:02:e4:d8:4f, Dst: 00:00:0c:07:ac:01
> > > > Internet Protocol, Src Addr: 2.33.109.115 (2.33.109.115), Dst Addr:
> > > > 165.72.165.25 (165.72.165.25)
> > > > Transmission Control Protocol, Src Port: 4072 (4072), Dst Port: http
> > (80),
> > > > Seq: 516078, Ack: 1, Len: 512
> > > > Source port: 4072 (4072)
> > > > Destination port: http (80)
> > > > Sequence number: 516078 (relative sequence number)
> > > > Next sequence number: 516590 (relative sequence number)
> > > > Acknowledgement number: 1 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0018 (PSH, ACK)
> > > > Window size: 64240
> > > > Checksum: 0xbc10 (incorrect, should be 0x3d1d)
> > > > Hypertext Transfer Protocol
> > > > Data (512 bytes)
> > > >
> > > > 0000 77 ab 66 79 89 57 64 c8 93 3c ea 56 75 07 14 b8
> > w.fy.Wd..<.Vu...
> > > > 0010 8a 2b 0e 31 76 75 59 be 37 58 ac 63 0a dc a5 ee
> > .+.1vuY.7X.c....
> > > > 0020 66 0a dc 23 48 87 03 35 10 a2 f1 3d 8b 10 64 02
> > f..#H..5...=..d.
> > > > 0030 63 63 8b 7c cf 17 63 8e 70 a9 07 04 dd f6 7d 5f
> > cc.|..c.p.....}_
> > > > 0040 ef ea 0a cb ce e1 e9 ff 9f 95 26 8c 7d c8 ad 1e
> > ..........&.}...
> > > > 0050 54 7b 2d 4f 15 8f d1 83 91 c6 3a ff 8e ee 5f 26
> > T{-O......:..._&
> > > > 0060 b2 07 81 e9 ad 6a 9f 9b 56 ab b6 a4 6e 1e 0f ae
> > .....j..V...n...
> > > > 0070 6a 8a 44 43 f5 f9 8b 9a 22 3b 4a 1b aa 83 56 45
> > j.DC....";J...VE
> > > > 0080 45 b5 73 1b 70 53 68 fb da 4d 41 3e be 95 f4 12
> > E.s.pSh..MA>....
> > > > 0090 54 aa 45 ba 78 9f 4c 3d a2 f6 bb d5 2f d4 a3 82
> > T.E.x.L=..../...
> > > > 00a0 46 75 4b 39 2e 8f 98 16 87 c9 f0 1c 27 73 06 5a
> > FuK9........'s.Z
> > > > 00b0 9d a8 44 20 61 8e 66 f4 3a 0f 50 bf 54 4f 70 b8 ..D
> > a.f.:.P.TOp.
> > > > 00c0 fd 64 1c 92 23 ed f2 aa a7 f8 e9 02 f5 2b 73 e8
> > .d..#........+s.
> > > > 00d0 be f7 47 24 2c c0 cf 30 e0 67 19 c8 33 0c e4 d7
> > ..G$,..0.g..3...
> > > > 00e0 7c 76 cd a0 cf 07 2f ec 94 69 52 ef 30 85 d5 aa
> > |v..../..iR.0...
> > > > 00f0 09 d6 d5 d9 5d c3 b2 40 43 93 20 5f 77 4d 5c 1e ....]..@C.
> > _wM\.
> > > > 0100 e2 6c 40 5b cd 53 26 a8 d5 2b 55 bf 4f ca 2f ba
> > .l@[.S&..+U.O./.
> > > > 0110 9c ee 52 7f f0 a8 97 4d e7 37 90 98 fe 2a f4 de
> > ..R....M.7...*..
> > > > 0120 80 ac 70 34 ac d5 eb b1 bb 96 42 d8 77 df 84 fa
> > ..p4......B.w...
> > > > 0130 d7 39 6f bc 2d 28 b7 37 e5 fa 44 58 f0 ae 47 bd
> > .9o.-(.7..DX..G.
> > > > 0140 c7 8d 06 af d5 6b 42 30 57 c8 7d ec 0b 7b 4b 82
> > .....kB0W.}..{K.
> > > > 0150 64 d1 8a bd 2e 1a 5f 2a d6 bb b4 df 64 3d d4 73
> > d....._*....d=.s
> > > > 0160 90 cc f0 0f d4 87 6c 3a ff 18 a3 c1 2a 47 6b 5a
> > ......l:....*GkZ
> > > > 0170 7d cc 85 5c bb ad 6a df fa b3 e5 c2 62 af dc ce
> > }..\..j.....b...
> > > > 0180 ee b1 c6 96 f2 9d 5b af fa 54 fd 85 d7 fd 4c d0
> > ......[..T....L.
> > > > 0190 b0 60 a4 b0 b1 b1 0e 5a 0a f5 ea d0 8f 53 5f 70
> > .`.....Z.....S_p
> > > > 01a0 ab e1 4a f5 25 d7 b3 e0 36 8d 02 56 7b d5 d7 fc
> > ..J.%...6..V{...
> > > > 01b0 f2 c7 95 ea 9b 4e c7 6a bb 7a bf 57 4e 51 7f 83
> > .....N.j.z.WNQ..
> > > > 01c0 38 a8 6f f9 85 d1 ea 6a 93 35 45 32 d4 3f 60 a6
> > 8.o....j.5E2.?`.
> > > > 01d0 eb 8d 54 4e ee 25 47 a0 03 7e 7b e7 9d c2 96 ee
> > ..TN.%G..~{.....
> > > > 01e0 de 30 9f 93 74 e2 bf 67 66 ba d4 77 5d fc 0a 42
> > .0..t..gf..w]..B
> > > > 01f0 4f 2c 95 9b b5 70 6b d2 12 9b 85 0f b7 89 a6 35
> > O,...pk........5
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236622 15:50:01.880737 165.72.165.25 2.33.109.115
> > TCP
> > > > http > 4072 [RST, ACK] Seq=1 Ack=516078 Win=0 Len=0
> > > >
> > > > Frame 236622 (60 bytes on wire, 60 bytes captured)
> > > > Ethernet II, Src: 00:60:fb:51:62:a6, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4072
> > (4072),
> > > > Seq: 1, Ack: 516078, Len: 0
> > > > Source port: http (80)
> > > > Destination port: 4072 (4072)
> > > > Sequence number: 1 (relative sequence number)
> > > > Acknowledgement number: 516078 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0014 (RST, ACK)
> > > > Window size: 0
> > > > Checksum: 0x1023 (correct)
> > > > SEQ/ACK analysis
> > > > This is an ACK to the segment in frame: 236620
> > > > The RTT to ACK the segment was: 0.000463000 seconds
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236623 15:50:01.880860 165.72.165.25 2.33.109.115
> > TCP
> > > > http > 4072 [RST, ACK] Seq=1 Ack=516590 Win=0 Len=0
> > > >
> > > > Frame 236623 (60 bytes on wire, 60 bytes captured)
> > > > Ethernet II, Src: 00:60:fb:51:62:a6, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4072
> > (4072),
> > > > Seq: 1, Ack: 516590, Len: 0
> > > > Source port: http (80)
> > > > Destination port: 4072 (4072)
> > > > Sequence number: 1 (relative sequence number)
> > > > Acknowledgement number: 516590 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0014 (RST, ACK)
> > > > Window size: 0
> > > > Checksum: 0x0e23 (correct)
> > > > SEQ/ACK analysis
> > > > This is an ACK to the segment in frame: 236621
> > > > The RTT to ACK the segment was: 0.000460000 seconds
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236624 15:50:01.980765 165.72.165.25 2.33.109.115
> > TCP
> > > > http > 4072 [RST] Seq=1 Ack=516078 Win=0 Len=0
> > > >
> > > > Frame 236624 (60 bytes on wire, 60 bytes captured)
> > > > Ethernet II, Src: 00:60:fb:51:62:a5, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4072
> > (4072),
> > > > Seq: 1, Ack: 516078, Len: 0
> > > > Source port: http (80)
> > > > Destination port: 4072 (4072)
> > > > Sequence number: 1 (relative sequence number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0004 (RST)
> > > > Window size: 0
> > > > Checksum: 0x1033 (correct)
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236625 15:50:01.980943 165.72.165.25 2.33.109.115
> > TCP
> > > > http > 4072 [RST] Seq=1 Ack=516590 Win=0 Len=0
> > > >
> > > > Frame 236625 (60 bytes on wire, 60 bytes captured)
> > > > Ethernet II, Src: 00:60:fb:51:62:a5, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4072
> > (4072),
> > > > Seq: 1, Ack: 516590, Len: 0
> > > > Source port: http (80)
> > > > Destination port: 4072 (4072)
> > > > Sequence number: 1 (relative sequence number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0004 (RST)
> > > > Window size: 0
> > > > Checksum: 0x0e33 (correct)
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236626 15:50:02.095888 2.33.109.115 165.72.165.25
> > TCP
> > > > 4073 > http [SYN] Seq=0 Ack=0 Win=64240 Len=0 MSS=1460
> > > >
> > > > Frame 236626 (62 bytes on wire, 62 bytes captured)
> > > > Ethernet II, Src: 00:08:02:e4:d8:4f, Dst: 00:00:0c:07:ac:01
> > > > Internet Protocol, Src Addr: 2.33.109.115 (2.33.109.115), Dst Addr:
> > > > 165.72.165.25 (165.72.165.25)
> > > > Transmission Control Protocol, Src Port: 4073 (4073), Dst Port: http
> > (80),
> > > > Seq: 0, Ack: 0, Len: 0
> > > > Source port: 4073 (4073)
> > > > Destination port: http (80)
> > > > Sequence number: 0 (relative sequence number)
> > > > Header length: 28 bytes
> > > > Flags: 0x0002 (SYN)
> > > > Window size: 64240
> > > > Checksum: 0xdb11 (correct)
> > > > Options: (8 bytes)
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236627 15:50:02.141335 165.72.165.25 2.33.109.115
> > TCP
> > > > http > 4073 [SYN, ACK] Seq=0 Ack=1 Win=1460 Len=0 MSS=1460
> > > >
> > > > Frame 236627 (62 bytes on wire, 62 bytes captured)
> > > > Ethernet II, Src: 00:12:80:97:3c:20, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4073
> > (4073),
> > > > Seq: 0, Ack: 1, Len: 0
> > > > Source port: http (80)
> > > > Destination port: 4073 (4073)
> > > > Sequence number: 0 (relative sequence number)
> > > > Acknowledgement number: 1 (relative ack number)
> > > > Header length: 28 bytes
> > > > Flags: 0x0012 (SYN, ACK)
> > > > Window size: 1460
> > > > Checksum: 0x852c (correct)
> > > > Options: (8 bytes)
> > > > SEQ/ACK analysis
> > > > This is an ACK to the segment in frame: 236626
> > > > The RTT to ACK the segment was: 0.045447000 seconds
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236628 15:50:02.141448 2.33.109.115 165.72.165.25
> > TCP
> > > > 4073 > http [ACK] Seq=1 Ack=1 Win=64240 [CHECKSUM INCORRECT] Len=0
> > > >
> > > > Frame 236628 (54 bytes on wire, 54 bytes captured)
> > > > Ethernet II, Src: 00:08:02:e4:d8:4f, Dst: 00:00:0c:07:ac:01
> > > > Internet Protocol, Src Addr: 2.33.109.115 (2.33.109.115), Dst Addr:
> > > > 165.72.165.25 (165.72.165.25)
> > > > Transmission Control Protocol, Src Port: 4073 (4073), Dst Port: http
> > (80),
> > > > Seq: 1, Ack: 1, Len: 0
> > > > Source port: 4073 (4073)
> > > > Destination port: http (80)
> > > > Sequence number: 1 (relative sequence number)
> > > > Acknowledgement number: 1 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0010 (ACK)
> > > > Window size: 64240
> > > > Checksum: 0xba10 (incorrect, should be 0xbcb3)
> > > > SEQ/ACK analysis
> > > > This is an ACK to the segment in frame: 236627
> > > > The RTT to ACK the segment was: 0.000113000 seconds
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236629 15:50:02.141761 2.33.109.115 165.72.165.25
> > HTTP
> > > > DELETE
> > > > /nps-svn/NPS-Application/!svn/act/aad32169-0229-2c4e-8714-a2d51d93dbdc
> > > > HTTP/1.1
> > > >
> > > > Frame 236629 (301 bytes on wire, 301 bytes captured)
> > > > Ethernet II, Src: 00:08:02:e4:d8:4f, Dst: 00:00:0c:07:ac:01
> > > > Internet Protocol, Src Addr: 2.33.109.115 (2.33.109.115), Dst Addr:
> > > > 165.72.165.25 (165.72.165.25)
> > > > Transmission Control Protocol, Src Port: 4073 (4073), Dst Port: http
> > (80),
> > > > Seq: 1, Ack: 1, Len: 247
> > > > Source port: 4073 (4073)
> > > > Destination port: http (80)
> > > > Sequence number: 1 (relative sequence number)
> > > > Next sequence number: 248 (relative sequence number)
> > > > Acknowledgement number: 1 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0018 (PSH, ACK)
> > > > Window size: 64240
> > > > Checksum: 0xbb07 (incorrect, should be 0x8fc9)
> > > > Hypertext Transfer Protocol
> > > > DELETE
> > > > /nps-svn/NPS-Application/!svn/act/aad32169-0229-2c4e-8714-a2d51d93dbdc
> > > > HTTP/1.1\r\n
> > > > Request Method: DELETE
> > > > Host: czcholsint004.prg-dc.dhl.com\r\n
> > > > User-Agent: SVN/1.2.0 (r14790) neon/0.24.7\r\n
> > > > Connection: TE\r\n
> > > > TE: trailers\r\n
> > > > Authorization: Basic xxxxxxxxxxxxxxxxxxxxx\r\n
> > > > \r\n
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236630 15:50:02.188235 165.72.165.25 2.33.109.115
> > TCP
> > > > http > 4073 [ACK] Seq=1 Ack=248 Win=6432 Len=0
> > > >
> > > > Frame 236630 (60 bytes on wire, 60 bytes captured)
> > > > Ethernet II, Src: 00:12:80:97:3c:20, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4073
> > (4073),
> > > > Seq: 1, Ack: 248, Len: 0
> > > > Source port: http (80)
> > > > Destination port: 4073 (4073)
> > > > Sequence number: 1 (relative sequence number)
> > > > Acknowledgement number: 248 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0010 (ACK)
> > > > Window size: 6432
> > > > Checksum: 0x9d8d (correct)
> > > > SEQ/ACK analysis
> > > > This is an ACK to the segment in frame: 236629
> > > > The RTT to ACK the segment was: 0.046474000 seconds
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236631 15:50:02.513670 165.72.165.25 2.33.109.115
> > HTTP
> > > > HTTP/1.1 204 No Content
> > > >
> > > > Frame 236631 (239 bytes on wire, 239 bytes captured)
> > > > Ethernet II, Src: 00:12:80:97:3c:20, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4073
> > (4073),
> > > > Seq: 1, Ack: 248, Len: 185
> > > > Source port: http (80)
> > > > Destination port: 4073 (4073)
> > > > Sequence number: 1 (relative sequence number)
> > > > Next sequence number: 186 (relative sequence number)
> > > > Acknowledgement number: 248 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0018 (PSH, ACK)
> > > > Window size: 6432
> > > > Checksum: 0x3983 (correct)
> > > > Hypertext Transfer Protocol
> > > > HTTP/1.1 204 No Content\r\n
> > > > Response Code: 204
> > > > Date: Tue, 28 Jun 2005 13:44:30 GMT\r\n
> > > > Server: Apache/2.0.53 (Unix) mod_ssl/2.0.53 OpenSSL/0.9.7a DAV/2
> > > > SVN/1.1.4\r\n
> > > > Content-Length: 0\r\n
> > > > Content-Type: text/plain\r\n
> > > > \r\n
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236632 15:50:02.626447 2.33.109.115 165.72.165.25
> > TCP
> > > > 4073 > http [ACK] Seq=248 Ack=186 Win=64055 [CHECKSUM INCORRECT] Len=0
> > > >
> > > > Frame 236632 (54 bytes on wire, 54 bytes captured)
> > > > Ethernet II, Src: 00:08:02:e4:d8:4f, Dst: 00:00:0c:07:ac:01
> > > > Internet Protocol, Src Addr: 2.33.109.115 (2.33.109.115), Dst Addr:
> > > > 165.72.165.25 (165.72.165.25)
> > > > Transmission Control Protocol, Src Port: 4073 (4073), Dst Port: http
> > (80),
> > > > Seq: 248, Ack: 186, Len: 0
> > > > Source port: 4073 (4073)
> > > > Destination port: http (80)
> > > > Sequence number: 248 (relative sequence number)
> > > > Acknowledgement number: 186 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0010 (ACK)
> > > > Window size: 64055
> > > > Checksum: 0xba10 (incorrect, should be 0xbbbc)
> > > > SEQ/ACK analysis
> > > > This is an ACK to the segment in frame: 236631
> > > > The RTT to ACK the segment was: 0.112777000 seconds
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236633 15:50:17.522817 165.72.165.25 2.33.109.115
> > TCP
> > > > http > 4073 [FIN, ACK] Seq=186 Ack=248 Win=6432 Len=0
> > > >
> > > > Frame 236633 (60 bytes on wire, 60 bytes captured)
> > > > Ethernet II, Src: 00:12:80:97:3c:20, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4073
> > (4073),
> > > > Seq: 186, Ack: 248, Len: 0
> > > > Source port: http (80)
> > > > Destination port: 4073 (4073)
> > > > Sequence number: 186 (relative sequence number)
> > > > Acknowledgement number: 248 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0011 (FIN, ACK)
> > > > Window size: 6432
> > > > Checksum: 0x9cd3 (correct)
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236634 15:50:17.522876 2.33.109.115 165.72.165.25
> > TCP
> > > > 4073 > http [ACK] Seq=248 Ack=187 Win=64055 [CHECKSUM INCORRECT] Len=0
> > > >
> > > > Frame 236634 (54 bytes on wire, 54 bytes captured)
> > > > Ethernet II, Src: 00:08:02:e4:d8:4f, Dst: 00:00:0c:07:ac:01
> > > > Internet Protocol, Src Addr: 2.33.109.115 (2.33.109.115), Dst Addr:
> > > > 165.72.165.25 (165.72.165.25)
> > > > Transmission Control Protocol, Src Port: 4073 (4073), Dst Port: http
> > (80),
> > > > Seq: 248, Ack: 187, Len: 0
> > > > Source port: 4073 (4073)
> > > > Destination port: http (80)
> > > > Sequence number: 248 (relative sequence number)
> > > > Acknowledgement number: 187 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0010 (ACK)
> > > > Window size: 64055
> > > > Checksum: 0xba10 (incorrect, should be 0xbbbb)
> > > > SEQ/ACK analysis
> > > > This is an ACK to the segment in frame: 236633
> > > > The RTT to ACK the segment was: 0.000059000 seconds
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236635 15:51:34.060372 2.33.109.115 165.72.165.25
> > TCP
> > > > 4073 > http [FIN, ACK] Seq=248 Ack=187 Win=64055 [CHECKSUM INCORRECT]
> > > > Len=0
> > > >
> > > > Frame 236635 (54 bytes on wire, 54 bytes captured)
> > > > Ethernet II, Src: 00:08:02:e4:d8:4f, Dst: 00:00:0c:07:ac:01
> > > > Internet Protocol, Src Addr: 2.33.109.115 (2.33.109.115), Dst Addr:
> > > > 165.72.165.25 (165.72.165.25)
> > > > Transmission Control Protocol, Src Port: 4073 (4073), Dst Port: http
> > (80),
> > > > Seq: 248, Ack: 187, Len: 0
> > > > Source port: 4073 (4073)
> > > > Destination port: http (80)
> > > > Sequence number: 248 (relative sequence number)
> > > > Acknowledgement number: 187 (relative ack number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0011 (FIN, ACK)
> > > > Window size: 64055
> > > > Checksum: 0xba10 (incorrect, should be 0xbbba)
> > > >
> > > > No. Time Source Destination
> > > > Protocol
> > > > Info
> > > > 236636 15:51:34.105175 165.72.165.25 2.33.109.115
> > TCP
> > > > http > 4073 [RST] Seq=187 Ack=1085398113 Win=0 Len=0
> > > >
> > > > Frame 236636 (60 bytes on wire, 60 bytes captured)
> > > > Ethernet II, Src: 00:12:80:97:3c:20, Dst: 00:08:02:e4:d8:4f
> > > > Internet Protocol, Src Addr: 165.72.165.25 (165.72.165.25), Dst Addr:
> > > > 2.33.109.115 (2.33.109.115)
> > > > Transmission Control Protocol, Src Port: http (80), Dst Port: 4073
> > (4073),
> > > > Seq: 187, Ack: 1085398113, Len: 0
> > > > Source port: http (80)
> > > > Destination port: 4073 (4073)
> > > > Sequence number: 187 (relative sequence number)
> > > > Header length: 20 bytes
> > > > Flags: 0x0004 (RST)
> > > > Window size: 0
> > > > Checksum: 0x99e5 (correct)
> > > >
> > >
> > > --
> > > 5 GB Mailbox, 50 FreeSMS http://www.gmx.net/de/go/promail
> > > +++ GMX - die erste Adresse f|r Mail, Message, More +++
> > >
> > > ---------------------------------------------------------------------
> > > To unsubscribe, e-mail: users-unsubscribe@subversion.tigris.org
> > > For additional commands, e-mail: users-help@subversion.tigris.org
> >
>
> --
> Weitersagen: GMX DSL-Flatrates mit Tempo-Garantie!
> Ab 4,99 Euro/Monat: http://www.gmx.net/de/go/dsl
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscribe@subversion.tigris.org
> For additional commands, e-mail: users-help@subversion.tigris.org
>
>

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@subversion.tigris.org
For additional commands, e-mail: users-help@subversion.tigris.org
Received on Wed Jul 13 07:33:30 2005

This is an archived mail posted to the Subversion Users mailing list.

This site is subject to the Apache Privacy Policy and the Apache Public Forum Archive Policy.