Je ne suis pas chez moi. Cela dit je viens de tester la commande de là où je suis :
çà se lit comment ce truc !?!
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
15:40:08.593645 IP 192.168.1.11.37472 > 216.58.213.174.443: Flags [P.], seq 1428189638:1428190157, ack 555947345, win 1324, options [nop,nop,TS val 745711 ecr 3299392057], length 519
15:40:08.593779 IP 192.168.1.11.37472 > 216.58.213.174.443: Flags [P.], seq 519:557, ack 1, win 1324, options [nop,nop,TS val 745711 ecr 3299392057], length 38
15:40:08.624415 IP 216.58.213.174.443 > 192.168.1.11.37472: Flags [.], ack 519, win 810, options [nop,nop,TS val 3299396002 ecr 745711], length 0
15:40:08.625790 IP 216.58.213.174.443 > 192.168.1.11.37472: Flags [.], ack 557, win 810, options [nop,nop,TS val 3299396004 ecr 745711], length 0
15:40:08.630040 IP 216.58.213.174.443 > 192.168.1.11.37472: Flags [P.], seq 1:81, ack 557, win 811, options [nop,nop,TS val 3299396008 ecr 745711], length 80
15:40:08.630242 IP 216.58.213.174.443 > 192.168.1.11.37472: Flags [P.], seq 81:127, ack 557, win 811, options [nop,nop,TS val 3299396009 ecr 745711], length 46
15:40:08.630442 IP 192.168.1.11.37472 > 216.58.213.174.443: Flags [.], ack 127, win 1324, options [nop,nop,TS val 745720 ecr 3299396008], length 0
15:40:08.630523 IP 192.168.1.11.37472 > 216.58.213.174.443: Flags [P.], seq 557:603, ack 127, win 1324, options [nop,nop,TS val 745720 ecr 3299396008], length 46
15:40:08.695421 IP 216.58.213.174.443 > 192.168.1.11.37472: Flags [.], ack 603, win 811, options [nop,nop,TS val 3299396034 ecr 745720], length 0
15:40:15.645350 IP 163.172.90.35.443 > 192.168.1.11.59408: Flags [P.], seq 2985886813:2985887150, ack 230399472, win 270, options [nop,nop,TS val 4183603829 ecr 745142], length 337
15:40:15.645391 IP 192.168.1.11.59408 > 163.172.90.35.443: Flags [.], ack 337, win 1924, options [nop,nop,TS val 747474 ecr 4183603829], length 0
15:40:15.645400 IP 163.172.90.35.443 > 192.168.1.11.59408: Flags [P.], seq 337:375, ack 1, win 270, options [nop,nop,TS val 4183603829 ecr 745142], length 38
15:40:15.645407 IP 192.168.1.11.59408 > 163.172.90.35.443: Flags [.], ack 375, win 1924, options [nop,nop,TS val 747474 ecr 4183603829], length 0
15:40:15.757084 IP 192.168.1.11.58836 > 81.253.149.9.53: 39256+ A? www.debian-fr.org. (35)
15:40:15.757099 IP 192.168.1.11.58836 > 81.253.149.9.53: 998+ AAAA? www.debian-fr.org. (35)
15:40:15.757503 IP 192.168.1.11.59408 > 163.172.90.35.443: Flags [P.], seq 1:579, ack 375, win 1926, options [nop,nop,TS val 747502 ecr 4183603829], length 578
15:40:15.781439 IP 81.253.149.9.53 > 192.168.1.11.58836: 39256 2/0/0 CNAME debian-fr.org., A 163.172.90.35 (65)
15:40:15.783048 IP 81.253.149.9.53 > 192.168.1.11.58836: 998 2/0/0 CNAME debian-fr.org., AAAA 2001:bc8:280a:1:ff:1:0:100 (77)
15:40:15.791464 IP 163.172.90.35.443 > 192.168.1.11.59408: Flags [P.], seq 375:417, ack 579, win 270, options [nop,nop,TS val 4183603830 ecr 747502], length 42
15:40:15.791510 IP 192.168.1.11.59408 > 163.172.90.35.443: Flags [.], ack 417, win 1926, options [nop,nop,TS val 747511 ecr 4183603830], length 0
15:40:15.791762 IP 192.168.1.11.59408 > 163.172.90.35.443: Flags [P.], seq 579:991, ack 417, win 1926, options [nop,nop,TS val 747511 ecr 4183603830], length 412
15:40:16.018702 IP 163.172.90.35.443 > 192.168.1.11.59408: Flags [.], ack 991, win 270, options [nop,nop,TS val 4183603830 ecr 747511], length 0
15:40:16.862070 IP 192.168.1.11.52380 > 216.58.204.130.443: Flags [P.], seq 1247792838:1247792884, ack 3369075077, win 340, options [nop,nop,TS val 747778 ecr 3081184926], length 46
15:40:16.886882 IP 216.58.204.130.443 > 192.168.1.11.52380: Flags [.], ack 46, win 217, options [nop,nop,TS val 3081243617 ecr 747778], length 0
15:40:16.887045 IP 216.58.204.130.443 > 192.168.1.11.52380: Flags [P.], seq 1:47, ack 46, win 217, options [nop,nop,TS val 3081243617 ecr 747778], length 46
15:40:16.930794 IP 192.168.1.11.52380 > 216.58.204.130.443: Flags [.], ack 47, win 340, options [nop,nop,TS val 747796 ecr 3081243617], length 0
^C
26 packets captured
26 packets received by filter
0 packets dropped by kernel