lubux schrieb:
Versuch mal auf deinem Server, mit:
sudo tcpdump -c 40 -vvveni eth0 port 80 or port 443
(... Interface, hier eth0, evtl. anpassen)
und danach Zugriff aus den Internet auf den Server.
Hier das Ergebnis. Es scheint wohl doch was anzukommen, allerdings kenn ich mich nicht gut genug auch um das zu interpretieren...
root@Server:/etc/apache2# tcpdump -c 40 -vvveni eth0 port 80 or port 443
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
22:21:48.908044 9c:c7:a6:5d:31:61 > 08:00:27:34:7a:c8, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 52, id 30499, offset 0, flags [DF], proto TCP (6), length 60)
80.187.97.XX.7234 > 192.168.178.20.80: Flags [S], cksum 0x4fd3 (correct), seq 2619134081, win 14600, options [mss 1452,sackOK,TS val 1772988322 ecr 0,nop,wscale 9], length 0
22:21:48.908072 08:00:27:34:7a:c8 > 9c:c7:a6:5d:31:61, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
192.168.178.20.80 > 80.187.97.XX.7234: Flags [S.], cksum 0x24d9 (incorrect -> 0xf636), seq 376807569, ack 2619134082, win 28960, options [mss 1460,sackOK,TS val 1534543 ecr 1772988322,nop,wscale 7], length 0
22:21:48.908786 9c:c7:a6:5d:31:61 > 08:00:27:34:7a:c8, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 63, id 0, offset 0, flags [none], proto TCP (6), length 40)
80.187.97.XX.7234 > 192.168.178.20.80: Flags [R], cksum 0x0205 (correct), seq 2619134082, win 0, length 0
22:21:49.892845 9c:c7:a6:5d:31:61 > 08:00:27:34:7a:c8, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 52, id 30500, offset 0, flags [DF], proto TCP (6), length 60)
80.187.97.XX.7234 > 192.168.178.20.80: Flags [S], cksum 0x4beb (correct), seq 2619134081, win 14600, options [mss 1452,sackOK,TS val 1772989322 ecr 0,nop,wscale 9], length 0
22:21:49.892865 08:00:27:34:7a:c8 > 9c:c7:a6:5d:31:61, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
192.168.178.20.80 > 80.187.97.XX.7234: Flags [S.], cksum 0x24d9 (incorrect -> 0x2552), seq 392194989, ack 2619134082, win 28960, options [mss 1460,sackOK,TS val 1534789 ecr 1772989322,nop,wscale 7], length 0
22:21:49.893529 9c:c7:a6:5d:31:61 > 08:00:27:34:7a:c8, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 63, id 0, offset 0, flags [none], proto TCP (6), length 40)
80.187.97.XX.7234 > 192.168.178.20.80: Flags [R], cksum 0x0205 (correct), seq 2619134082, win 0, length 0
22:21:51.866510 9c:c7:a6:5d:31:61 > 08:00:27:34:7a:c8, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 52, id 30501, offset 0, flags [DF], proto TCP (6), length 60)
80.187.97.XX.7234 > 192.168.178.20.80: Flags [S], cksum 0x441b (correct), seq 2619134081, win 14600, options [mss 1452,sackOK,TS val 1772991322 ecr 0,nop,wscale 9], length 0
22:21:51.866538 08:00:27:34:7a:c8 > 9c:c7:a6:5d:31:61, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
192.168.178.20.80 > 80.187.97.XX.7234: Flags [S.], cksum 0x24d9 (incorrect -> 0x8a5f), seq 423033612, ack 2619134082, win 28960, options [mss 1460,sackOK,TS val 1535282 ecr 1772991322,nop,wscale 7], length 0
22:21:51.867225 9c:c7:a6:5d:31:61 > 08:00:27:34:7a:c8, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 63, id 0, offset 0, flags [none], proto TCP (6), length 40)
80.187.97.XX.7234 > 192.168.178.20.80: Flags [R], cksum 0x0205 (correct), seq 2619134082, win 0, length 0
22:21:55.811304 9c:c7:a6:5d:31:61 > 08:00:27:34:7a:c8, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 52, id 30502, offset 0, flags [DF], proto TCP (6), length 60)
80.187.97.XX.7234 > 192.168.178.20.80: Flags [S], cksum 0x347b (correct), seq 2619134081, win 14600, options [mss 1452,sackOK,TS val 1772995322 ecr 0,nop,wscale 9], length 0
22:21:55.811331 08:00:27:34:7a:c8 > 9c:c7:a6:5d:31:61, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
192.168.178.20.80 > 80.187.97.XX.7234: Flags [S.], cksum 0x24d9 (incorrect -> 0xf02b), seq 484671000, ack 2619134082, win 28960, options [mss 1460,sackOK,TS val 1536269 ecr 1772995322,nop,wscale 7], length 0
22:21:55.812031 9c:c7:a6:5d:31:61 > 08:00:27:34:7a:c8, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 63, id 0, offset 0, flags [none], proto TCP (6), length 40)
80.187.97.XX.7234 > 192.168.178.20.80: Flags [R], cksum 0x0205 (correct), seq 2619134082, win 0, length 0
12 packets captured
12 packets received by filter
0 packets dropped by kernel