* Max Feil <[email protected]>: > Already did use Wireshark. Here is some more info: > > If you look through the traces you'll notice that at some point Squid sends a > TCP [FIN, ACK] right in the middle of a connection for seemingly no reason. > (Attempting to close the connection) The server ignores this and sends the > rest of the data, which Squid responds to with TCP RST (request to reset) > since it now believes the connection to be closed.
That sounds like a Checkpoint FW-1 with "smart defense" (aka bloody stupid crap) somewhere in the path -- Ralf Hildebrandt Geschäftsbereich IT | Abteilung Netzwerk Charité - Universitätsmedizin Berlin Campus Benjamin Franklin Hindenburgdamm 30 | D-12203 Berlin Tel. +49 30 450 570 155 | Fax: +49 30 450 570 962 [email protected] | http://www.charite.de
