[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: ssh corrupt packets with aes encryption



recoverym4n@gmail.com writes:
>
> Can you provide a result of
> tcpdump -nn -s0 -i lo tcp port 22
> ?

I don't have any experience with tcpdump, so I'm just blindly following
instructions here -- let me know if you need more!

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on lo, link-type EN10MB (Ethernet), capture size 65535 bytes
13:02:57.605334 IP6 ::1.49493 > ::1.22: Flags [S], seq 1578479483, win 32752, options [mss 16376,sackOK,TS val 3813274 ecr 0,nop,wscale 3], length 0
13:02:57.605380 IP6 ::1.22 > ::1.49493: Flags [S.], seq 64267268, ack 1578479484, win 32728, options [mss 16376,sackOK,TS val 3813274 ecr 3813274,nop,wscale 3], length 0
13:02:57.605410 IP6 ::1.49493 > ::1.22: Flags [.], ack 1, win 4094, options [nop,nop,TS val 3813274 ecr 3813274], length 0
13:02:57.622043 IP6 ::1.22 > ::1.49493: Flags [P.], seq 1:33, ack 1, win 4091, options [nop,nop,TS val 3813278 ecr 3813274], length 32
13:02:57.622240 IP6 ::1.49493 > ::1.22: Flags [.], ack 33, win 4091, options [nop,nop,TS val 3813278 ecr 3813278], length 0
13:02:57.622386 IP6 ::1.49493 > ::1.22: Flags [P.], seq 1:33, ack 33, win 4091, options [nop,nop,TS val 3813278 ecr 3813278], length 32
13:02:57.622400 IP6 ::1.22 > ::1.49493: Flags [.], ack 33, win 4091, options [nop,nop,TS val 3813278 ecr 3813278], length 0
13:02:57.625546 IP6 ::1.49493 > ::1.22: Flags [P.], seq 33:1305, ack 33, win 4091, options [nop,nop,TS val 3813279 ecr 3813278], length 1272
13:02:57.625602 IP6 ::1.22 > ::1.49493: Flags [.], ack 1305, win 4091, options [nop,nop,TS val 3813279 ecr 3813279], length 0
13:02:57.627354 IP6 ::1.22 > ::1.49493: Flags [P.], seq 33:1017, ack 1305, win 4091, options [nop,nop,TS val 3813279 ecr 3813279], length 984
13:02:57.630548 IP6 ::1.49493 > ::1.22: Flags [P.], seq 1305:1385, ack 1017, win 4091, options [nop,nop,TS val 3813280 ecr 3813279], length 80
13:02:57.641874 IP6 ::1.22 > ::1.49493: Flags [P.], seq 1017:1329, ack 1385, win 4091, options [nop,nop,TS val 3813283 ecr 3813280], length 312
13:02:57.655780 IP6 ::1.49493 > ::1.22: Flags [P.], seq 1385:1401, ack 1329, win 4091, options [nop,nop,TS val 3813286 ecr 3813283], length 16
13:02:57.692109 IP6 ::1.22 > ::1.49493: Flags [.], ack 1401, win 4091, options [nop,nop,TS val 3813296 ecr 3813286], length 0
13:02:57.692134 IP6 ::1.49493 > ::1.22: Flags [P.], seq 1401:1449, ack 1329, win 4091, options [nop,nop,TS val 3813296 ecr 3813296], length 48
13:02:57.692148 IP6 ::1.22 > ::1.49493: Flags [.], ack 1449, win 4091, options [nop,nop,TS val 3813296 ecr 3813296], length 0
13:02:57.692284 IP6 ::1.22 > ::1.49493: Flags [P.], seq 1329:1393, ack 1449, win 4091, options [nop,nop,TS val 3813296 ecr 3813296], length 64
13:02:57.692318 IP6 ::1.22 > ::1.49493: Flags [F.], seq 1393, ack 1449, win 4091, options [nop,nop,TS val 3813296 ecr 3813296], length 0
13:02:57.694612 IP6 ::1.49493 > ::1.22: Flags [P.], seq 1449:1513, ack 1394, win 4091, options [nop,nop,TS val 3813296 ecr 3813296], length 64
13:02:57.694701 IP6 ::1.22 > ::1.49493: Flags [R], seq 64268662, win 0, length 0

20 packets captured
40 packets received by filter
0 packets dropped by kernel


Reply to: