* Max Feil <[email protected]>:
> Already did use Wireshark. Here is some more info:
> 
> If you look through the traces you'll notice that at some point Squid sends a 
> TCP [FIN, ACK] right in the middle of a connection for seemingly no reason. 
> (Attempting to close the connection) The server ignores this and sends the 
> rest of the data, which Squid responds to with TCP RST (request to reset) 
> since it now believes the connection to be closed.

That sounds like a Checkpoint FW-1 with "smart defense" (aka bloody
stupid crap) somewhere in the path

-- 
Ralf Hildebrandt
  Geschäftsbereich IT | Abteilung Netzwerk
  Charité - Universitätsmedizin Berlin
  Campus Benjamin Franklin
  Hindenburgdamm 30 | D-12203 Berlin
  Tel. +49 30 450 570 155 | Fax: +49 30 450 570 962
  [email protected] | http://www.charite.de
            

Reply via email to