Ok, dernier jet avant le weekend avec cette capture des 2 cotés pour avoir  un os a ronger ;-)

coté "client" VPS OVH qui initie la connexion

# openssl s_client -connect srv.int-evry.fr:443
Connecting to 157.150.11.6
CONNECTED(00000003)
write:errno=104

ce meme client voit ceci en filtrant sur l'IP du serveur sollicité

/# tcpdump -i eth0 host 157.150.11.6 and 'tcp[tcpflags] & tcp-syn != 0' -nnvv
dropped privs to tcpdump
tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes


16:52:54.044825 IP (tos 0x0, ttl 64, id 53493, offset 0, flags [DF], proto TCP (6), length 60)     51.178.25.200.46744 > 157.150.11.6.443: Flags [S], cksum 0xf58d (incorrect -> 0xf8d3), seq 1392587108, win 65320, options [mss 1420,sackOK,TS val 3947115214 ecr 0,nop,wscale 7], length 0 16:52:54.050731 IP (tos 0x0, ttl 50, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0x7651 (correct), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467895586 ecr 3947115214,nop,wscale 8], length 0 16:52:55.452651 IP (tos 0x0, ttl 50, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0x70d7 (correct), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467896988 ecr 3947115214,nop,wscale 8], length 0 16:52:57.452632 IP (tos 0x0, ttl 50, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0x6907 (correct), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467898988 ecr 3947115214,nop,wscale 8], length 0 16:53:01.452679 IP (tos 0x0, ttl 50, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0x5967 (correct), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467902988 ecr 3947115214,nop,wscale 8], length 0 16:53:09.452810 IP (tos 0x0, ttl 50, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0x3a27 (correct), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467910988 ecr 3947115214,nop,wscale 8], length 0

16:53:25.452647 IP (tos 0x0, ttl 50, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0xfba6 (correct), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467926988 ecr 3947115214,nop,wscale 8], length 0

^C
7 packets captured
9 packets received by filter
0 packets dropped by kernel/

J'ai pourtant l'impression qu'il reçoit bien les reponses dès le 2eme packet

/16:52:54.050731 IP (tos 0x0, ttl 50, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0x7651 (correct), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467895586 ecr 3947115214,nop,wscale 8], length 0/

Qui correspond a la reponse coté serveur

/17:52:54.047975 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0xf58d (incorrect -> 0x7651), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467895586 ecr 3947115214,nop,wscale 8], length 0/

=> meme /seq 1591607196,/ qui ack /1392587109 => /demande initiale en seq/1392587108 ,/ bref tout semble bon jusque là , non ?

Coté Serveur tj la meme chose au total

/# tcpdump -i eth0 host 51.178.25.200 and 'tcp[tcpflags] & tcp-syn != 0' -nnvv
dropped privs to tcpdump
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes


17:52:54.047928 IP (tos 0x0, ttl 48, id 53493, offset 0, flags [DF], proto TCP (6), length 60)     51.178.25.200.46744 > 157.150.11.6.443: Flags [S], cksum 0xf8d3 (correct), seq 1392587108, win 65320, options [mss 1420,sackOK,TS val 3947115214 ecr 0,nop,wscale 7], length 0 17:52:54.047975 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0xf58d (incorrect -> 0x7651), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467895586 ecr 3947115214,nop,wscale 8], length 0 17:52:55.449927 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0xf58d (incorrect -> 0x70d7), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467896988 ecr 3947115214,nop,wscale 8], length 0 17:52:57.449883 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0xf58d (incorrect -> 0x6907), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467898988 ecr 3947115214,nop,wscale 8], length 0 17:53:01.449928 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0xf58d (incorrect -> 0x5967), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467902988 ecr 3947115214,nop,wscale 8], length 0 17:53:09.449913 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0xf58d (incorrect -> 0x3a27), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467910988 ecr 3947115214,nop,wscale 8], length 0

17:53:25.449930 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.46744: Flags [S.], cksum 0xf58d (incorrect -> 0xfba6), seq 1591607196, ack 1392587109, win 28960, options [mss 1460,sackOK,TS val 3467926988 ecr 3947115214,nop,wscale 8], length 0

^C
7 packets captured
7 packets received by filter
0 packets dropped by kernel/

Bref je reste perplexe ...

Merci


On 3/6/26 17:18, David Ponzone wrote:
Faut prendre une trace tcpdump sur le client aussi, pour comparer paquet par paquet, ça te dira s’il y a des paquets retour qui ont été filtrés. Après, on peut faire une comparaison des 2 traces avec Wireshark à priori (sujet abordé dans un autre fil récemment).

David

Le 6 mars 2026 à 16:15, jehan procaccia INT <[email protected]> a écrit :

MErci , mais bof .. cela ne change pas apparement

sur le client VPS OVH je fait

# ip link set dev eth0 mtu 1460

c'est bien en place

2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu *1460* qdisc fq_codel state UP group default qlen 1000

je lance mon test

# openssl s_client -connect srv.int-evry.fr:443

meme echec

coté server destination je vois bien arriver la requetes comme avant avec un Syn from /51.178.25.200 (VPS OVH) /et des reponses Syn-Ack depuis mon serveur lcoal (/157.150.11.6) /qui ne semblent pas revenir sur le VPS OVH :-(

# tcpdump -i eth0 host 51.178.25.200 and  'tcp[tcpflags] & tcp-syn != 0' -nnvv

/17:08:01.589820 IP (tos 0x0, ttl 48, id 2470, offset 0, flags [DF], proto TCP (6), length 60)     51.178.25.200.40236 > 157.150.11.6.443: Flags [S], cksum 0xd098 (correct), seq 412271373, win 65320, options [mss 1420,sackOK,TS val 3944422756 ecr 0,nop,wscale 7], length 0 17:08:01.589873 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.40236: Flags [S.], cksum 0xf58d (incorrect -> 0xba7f), seq 466676691, ack 412271374, win 28960, options [mss 1460,sackOK,TS val 3465203128 ecr 3944422756,nop,wscale 8], length 0 17:08:02.591909 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.40236: Flags [S.], cksum 0xf58d (incorrect -> 0xb695), seq 466676691, ack 412271374, win 28960, options [mss 1460,sackOK,TS val 3465204130 ecr 3944422756,nop,wscale 8], length 0 17:08:04.591924 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.40236: Flags [S.], cksum 0xf58d (incorrect -> 0xaec5), seq 466676691, ack 412271374, win 28960, options [mss 1460,sackOK,TS val 3465206130 ecr 3944422756,nop,wscale 8], length 0 17:08:08.591929 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.40236: Flags [S.], cksum 0xf58d (incorrect -> 0x9f25), seq 466676691, ack 412271374, win 28960, options [mss 1460,sackOK,TS val 3465210130 ecr 3944422756,nop,wscale 8], length 0 17:08:16.793894 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.40236: Flags [S.], cksum 0xf58d (incorrect -> 0x7f1b), seq 466676691, ack 412271374, win 28960, options [mss 1460,sackOK,TS val 3465218332 ecr 3944422756,nop,wscale 8], length 0 17:08:32.794923 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)     157.150.11.6.443 > 51.178.25.200.40236: Flags [S.], cksum 0xf58d (incorrect -> 0x409a), seq 466676691, ack 412271374, win 28960, options [mss 1460,sackOK,TS val 3465234333 ecr 3944422756,nop,wscale 8], length 0
^C
7 packets captured
7 packets received by filter
0 packets dropped by kernel/



On 3/6/26 16:38, David Ponzone wrote:
Ou en forçant le TCP MSS à 1420 par exemple.

David Ponzone



Le 6 mars 2026 à 15:34, P. Deloney via frnog<[email protected]> a écrit :

jehan procaccia INT via frnog<[email protected]>:

oui j'ai des traces [1]
Ça ressemble clairement à un problème de MTU ou une mauvaise
configuration d'un pare-feu "stateful".

Je ferais des tests en baissant le MTU de l'interface de l'hôte qui
initie la connexion TCP.


---------------------------
Liste de diffusion du FRnOG
http://www.frnog.org/

---------------------------
Liste de diffusion du FRnOG
http://www.frnog.org/

Répondre à