Vsftp : Impossible d'accéder à mon serveur

salut

dejà il faut rediriger le port 20 pour la transmission des données sinon ca marchera pas

Pour la n-ième fois : NON, [size=150]NON[/size] et [size=200]NON ![/size]

Le port 20 est utilisé par le serveur comme port source de connexions sortantes, et on n’a jamais eu besoin de faire de redirection de port pour recevoir les paquets de réponse d’une connexion sortante. Donc :

  1. Ça ne sert à rien.
  2. Il ne faut pas.

Salut
Si tu veux tester la bonne ouverture sur ta box du port souhaité, voici deux liens :
whatsmyip.org/ports/
yougetsignal.com/tools/open-ports/

PS: j’arrive pas à me connecté à ton serveur: introuvable…mais vu l’heure, tu l’as sans doute arrété.

[quote=“yanlolot”]Salut
Si tu veux tester la bonne ouverture sur ta box du port souhaité, voici deux liens :
whatsmyip.org/ports/
yougetsignal.com/tools/open-ports/

PS: j’arrive pas à me connecté à ton serveur: introuvable…mais vu l’heure, tu l’as sans doute arrété.[/quote]
Exact, il sera rallumé dans l’après midi (je serais en vacances \o/ ), si vous voulez tester à ce moment ci je vous dirais. Après tout, il y a un fichier pour vous :stuck_out_tongue: .

Pour la n-ième fois : NON, [size=150]NON[/size] et [size=200]NON ![/size]

Le port 20 est utilisé par le serveur comme port source de connexions sortantes, et on n’a jamais eu besoin de faire de redirection de port pour recevoir les paquets de réponse d’une connexion sortante. Donc :

  1. Ça ne sert à rien.
  2. Il ne faut pas.[/quote]
    En lisant ça, je me suis dit que ça venait peut-être du parefeu, mais il ne bloque rien en sortie, donc ça ne dois pas être ça. Voici ce que j’ai trouvé sur l’erreur 425, c’est cohérent à votre avis ?
    commentcamarche.net/forum/af … ur-425-ftp

Tu te met sur ton serveur et tu fais un

script /tmp/debug

tcpdump -n

et tu attends la connexion de l’extérieur. Tu tapes ^C et tu montres ce qu’il y a dans /tmp/debug, on pourra te dire ce qui coince.

T’aurais pas un pb de droit sur le dossier concerné ?

C’est bon, le serveur est de nouveau redémarré si vous voulez essayer, et tcpdump est lancé sur la bonne interface.
Pour les droit je ne pense pas avoir de souci, l’utilisateur debianfr a le droit de lecture.

Salut

J’ai essayé de me connecter (vers 14h25 pour toi). Une demande de login et de mot de passe, puis: 425 Failed to establish connection.

Donc toujours la même erreur… Mais comment la résoudre?
Voici ce que dit tcpdump :

[code]Script started on sam. 28 août 2010 14:12:33 CEST
root@Lothlorien:/home/xavier# exittcpdump -ne[C-ni-n -ne-nt-nh-n1-n -n
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
14:13:22.535858 IP 192.168.0.11.38643 > 212.27.40.240.53: 53121+ A? thuban.dyndns-free.com. (40)
14:13:22.579532 IP 212.27.40.240.53 > 192.168.0.11.38643: 53121 1/5/0 A 83.159.104.72 (156)
14:13:22.584830 IP 192.168.0.11.48196 > 212.27.40.240.53: 3906+ A? thuban.dyndns-free.com. (40)
14:13:22.707047 IP 212.27.40.240.53 > 192.168.0.11.48196: 3906 1/5/0 A 83.159.104.72 (156)
14:13:22.709116 IP 192.168.0.11.35314 > 212.27.40.240.53: 11362+ A? thuban.dyndns-free.com. (40)
14:13:22.835410 IP 212.27.40.240.53 > 192.168.0.11.35314: 11362 1/0/0 A 83.159.104.72 (56)
14:14:00.601222 ARP, Reply 192.168.0.11 is-at 70:1a:04:e7:79:dd, length 28
14:14:23.959922 IP 192.168.0.11.36035 > 212.27.40.240.53: 53461+ A? thuban.dyndns-free.com. (40)
14:14:24.003976 IP 212.27.40.240.53 > 192.168.0.11.36035: 53461 1/5/0 A 83.159.104.72 (156)
14:14:24.009496 IP 192.168.0.11.60675 > 212.27.40.240.53: 23712+ A? thuban.dyndns-free.com. (40)
14:14:24.131323 IP 212.27.40.240.53 > 192.168.0.11.60675: 23712 1/0/0 A 83.159.104.72 (56)
14:14:24.133504 IP 192.168.0.11.59090 > 212.27.40.240.53: 50650+ A? thuban.dyndns-free.com. (40)
14:14:24.172891 IP 212.27.40.240.53 > 192.168.0.11.59090: 50650 1/5/0 A 83.159.104.72 (156)
14:14:28.959013 ARP, Request who-has 192.168.0.254 tell 192.168.0.11, length 28
14:14:28.961701 ARP, Reply 192.168.0.254 is-at 00:07:cb:10:cd:85, length 28
14:16:25.553329 IP 212.27.40.240.53 > 192.168.0.11.44678: 53946 1/5/0 A 83.159.104.72 (156)
14:16:25.558666 IP 192.168.0.11.55055 > 212.27.40.240.53: 13008+ A? thuban.dyndns-free.com. (40)
14:16:25.585161 IP 188.72.225.172.443 > 192.168.0.11.40908: Flags [.], seq 564209:565507, ack 115362, win 502, options [nop,nop,TS val 31932932 ecr 320040], length 1298
14:16:25.585329 IP 192.168.0.11.40908 > 188.72.225.172.443: Flags [.], ack 565507, win 459, options [nop,nop,TS val 320057 ecr 31932932], length 0
14:16:25.610763 IP 188.72.225.172.443 > 192.168.0.11.40908: Flags [P.], seq 565507:566169, ack 115362, win 502, options [nop,nop,TS val 31932932 ecr 320040], length 662
14:16:25.610906 IP 192.168.0.11.40908 > 188.72.225.172.443: Flags [.], ack 566169, win 454, options [nop,nop,TS val 320063 ecr 31932932], length 0
14:16:25.611150 IP 212.27.40.240.53 > 192.168.0.11.55055: 13008 1/5/0 A 83.159.104.72 (156)
14:16:25.613362 IP 192.168.0.11.33855 > 212.27.40.240.53: 59001+ A? thuban.dyndns-free.com. (40)
14:16:25.734397 IP 212.27.40.240.53 > 192.168.0.11.33855: 59001 1/0/0 A 83.159.104.72 (56)
14:17:02.248160 ARP, Request who-has 192.168.0.11 tell 192.168.0.254, length 28
14:17:02.248202 ARP, Reply 192.168.0.11 is-at 70:1a:04:e7:79:dd, length 28
14:17:04.706036 IP 188.72.225.172.443 > 192.168.0.11.40908: Flags [P.], seq 689207:689793, ack 138580, win 502, options [nop,nop,TS val 31942684 ecr 326589], length 586
14:17:04.706198 IP 192.168.0.11.40908 > 188.72.225.172.443: Flags [.], ack 689793, win 499, options [nop,nop,TS val 329837 ecr 31942684], length 0
14:17:06.549318 IP 188.72.225.172.443 > 192.168.0.11.40908: Flags [P.], seq 689793:690379, ack 138580, win 502, options [nop,nop,TS val 31943126 ecr 329837], length 586
14:17:06.549475 IP 192.168.0.11.40908 > 188.72.225.172.443: Flags [.], ack 690379, win 499, options [nop,nop,TS val 330298 ecr 31943126], length 0
14:17:26.575711 IP 192.168.0.11.44307 > 212.27.40.240.53: 21203+ A? thuban.dyndns-free.com. (40)
14:17:26.616188 IP 212.27.40.240.53 > 192.168.0.11.44307: 21203 1/5/0 A 83.159.104.72 (156)
14:17:26.621503 IP 192.168.0.11.35593 > 212.27.40.240.53: 8004+ A? thuban.dyndns-free.com. (40)
14:17:26.673416 IP 212.27.40.240.53 > 192.168.0.11.35593: 8004 1/5/0 A 83.159.104.72 (156)
14:17:26.675515 IP 192.168.0.11.54938 > 212.27.40.240.53: 34003+ A? thuban.dyndns-free.com. (40)
14:17:26.798401 IP 212.27.40.240.53 > 192.168.0.11.54938: 34003 1/0/0 A 83.159.104.72 (56)

14:19:28.392713 IP 192.168.0.11.35539 > 212.27.40.240.53: 22439+ A? thuban.dyndns-free.com. (40)
14:19:28.434210 IP 212.27.40.240.53 > 192.168.0.11.35539: 22439 1/5/0 A 83.159.104.72 (156)
14:19:28.439113 IP 192.168.0.11.35415 > 212.27.40.240.53: 15233+ A? thuban.dyndns-free.com. (40)
14:19:28.479742 IP 212.27.40.240.53 > 192.168.0.11.35415: 15233 1/5/0 A 83.159.104.72 (156)
14:19:28.481700 IP 192.168.0.11.59204 > 212.27.40.240.53: 34612+ A? thuban.dyndns-free.com. (40)
14:19:28.521756 IP 212.27.40.240.53 > 192.168.0.11.59204: 34612 1/5/0 A 83.159.104.72 (156)
14:19:28.561873 ARP, Request who-has 192.168.0.254 tell 192.168.0.11, length 28
14:19:28.563043 ARP, Reply 192.168.0.254 is-at 00:07:cb:10:cd:85, length 28
14:20:06.876109 IP 188.72.225.172.443 > 192.168.0.11.40908: Flags [F.], seq 690379, ack 139752, win 502, options [nop,nop,TS val 31988201 ecr 347893], length 0
14:20:06.876876 IP 192.168.0.11.40908 > 188.72.225.172.443: Flags [F.], seq 139752, ack 690380, win 499, options [nop,nop,TS val 375380 ecr 31988201], length 0
14:20:06.951751 IP 188.72.225.172.443 > 192.168.0.11.40908: Flags [.], ack 139753, win 502, options [nop,nop,TS val 31988272 ecr 375380], length 0
14:20:11.377067 IP 192.168.0.11.55709 > 212.27.40.240.53: 55264+ A? checkip.dyndns.com. (36)
14:20:11.420875 IP 212.27.40.240.53 > 192.168.0.11.55709: 55264 3/0/0 A 91.198.22.70, A 208.78.69.70, A 204.13.248.70 (84)
14:20:11.421629 IP 192.168.0.11.57131 > 91.198.22.70.80: Flags [S], seq 2574181889, win 5840, options [mss 1460,sackOK,TS val 376516 ecr 0,nop,wscale 7], length 0
14:20:11.477353 IP 91.198.22.70.80 > 192.168.0.11.57131: Flags [S.], seq 2705162304, ack 2574181890, win 65535, options [mss 1412,nop,wscale 3,sackOK,TS val 2529546289 ecr 376516], length 0
14:20:11.477534 IP 192.168.0.11.57131 > 91.198.22.70.80: Flags [.], ack 1, win 46, options [nop,nop,TS val 376530 ecr 2529546289], length 0
14:20:11.477944 IP 192.168.0.11.57131 > 91.198.22.70.80: Flags [P.], seq 1:92, ack 1, win 46, options [nop,nop,TS val 376530 ecr 2529546289], length 91
14:20:11.535888 IP 91.198.22.70.80 > 192.168.0.11.57131: Flags [P.], seq 1:261, ack 92, win 8225, options [nop,nop,TS val 2529546349 ecr 376530], length 260
14:20:11.536253 IP 91.198.22.70.80 > 192.168.0.11.57131: Flags [F.], seq 261, ack 92, win 8225, options [nop,nop,TS val 2529546349 ecr 376530], length 0
14:20:11.536254 IP 192.168.0.11.57131 > 91.198.22.70.80: Flags [.], ack 261, win 54, options [nop,nop,TS val 376545 ecr 2529546349], length 0
14:20:11.536801 IP 192.168.0.11.57131 > 91.198.22.70.80: Flags [F.], seq 92, ack 262, win 54, options [nop,nop,TS val 376545 ecr 2529546349], length 0
14:20:11.591985 IP 91.198.22.70.80 > 192.168.0.11.57131: Flags [.], ack 93, win 8224, options [nop,nop,TS val 2529546405 ecr 376545], length 0
14:20:11.647873 ARP, Request who-has 192.168.0.11 tell 192.168.0.254, length 28
14:20:11.647958 ARP, Reply 192.168.0.11 is-at 70:1a:04:e7:79:dd, length 28
14:20:15.170855 IP 94.51.162.84.35200 > 192.168.0.11.9001: Flags [S], seq 3040427983, win 5648, options [mss 1412,sackOK,TS val 437854491 ecr 0,nop,wscale 7], length 0
14:20:15.171175 IP 192.168.0.11.9001 > 94.51.162.84.35200: Flags [S.], seq 2641663285, ack 3040427984, win 5792, options [mss 1460,sackOK,TS val 377453 ecr 437854491,nop,wscale 7], length 0
14:20:18.171093 IP 192.168.0.11.9001 > 94.51.162.84.35200: Flags [S.], seq 2641663285, ack 3040427984, win 5792, options [mss 1460,sackOK,TS val 378203 ecr 437854491,nop,wscale 7], length 0
14:20:18.173432 IP 94.51.162.84.35200 > 192.168.0.11.9001: Flags [S], seq 3040427983, win 5648, options [mss 1412,sackOK,TS val 437855241 ecr 0,nop,wscale 7], length 0
14:20:18.173535 IP 192.168.0.11.9001 > 94.51.162.84.35200: Flags [S.], seq 2641663285, ack 3040427984, win 5792, options [mss 1460,sackOK,TS val 378204 ecr 437854491,nop,wscale 7], length 0
14:20:19.193145 IP 192.168.0.11.51653 > 212.27.40.240.53: 29282+ AAAA? Lothlorien. (28)
14:20:19.257527 IP 212.27.40.240.53 > 192.168.0.11.51653: 29282 NXDomain 0/1/0 (103)
14:20:20.166968 ARP, Request who-has 192.168.0.254 tell 192.168.0.11, length 28
14:20:20.169662 ARP, Reply 192.168.0.254 is-at 00:07:cb:10:cd:85, length 28
14:20:24.186419 IP 192.168.0.11.9001 > 94.51.162.84.35200: Flags [S.], seq 2641663285, ack 3040427984, win 5792, options [mss 1460,sackOK,TS val 379707 ecr 437854491,nop,wscale 7], length 0
14:20:24.189714 IP 94.51.162.84.35200 > 192.168.0.11.9001: Flags [S], seq 3040427983, win 5648, options [mss 1412,sackOK,TS val 437856741 ecr 0,nop,wscale 7], length 0
14:20:24.189820 IP 192.168.0.11.9001 > 94.51.162.84.35200: Flags [S.], seq 2641663285, ack 3040427984, win 5792, options [mss 1460,sackOK,TS val 379708 ecr 437854491,nop,wscale 7], length 0
14:20:25.001076 IP 94.51.162.84.35200 > 192.168.0.11.9001: Flags [.], ack 1, win 45, options [nop,nop,TS val 437856902 ecr 379708], length 0
14:20:25.001387 IP 94.51.162.84.35200 > 192.168.0.11.9001: Flags [P.], seq 1:144, ack 1, win 45, options [nop,nop,TS val 437856902 ecr 379708], length 143
14:20:25.001483 IP 192.168.0.11.9001 > 94.51.162.84.35200: Flags [.], ack 144, win 54, options [nop,nop,TS val 379911 ecr 437856902], length 0
14:20:25.010034 IP 192.168.0.11.9001 > 94.51.162.84.35200: Flags [P.], seq 1:928, ack 144, win 54, options [nop,nop,TS val 379913 ecr 437856902], length 927
14:20:25.615434 IP 94.51.162.84.35200 > 192.168.0.11.9001: Flags [.], ack 928, win 59, options [nop,nop,TS val 437857064 ecr 379913], length 0
14:20:25.615723 IP 94.51.162.84.35200 > 192.168.0.11.9001: Flags [P.], seq 144:342, ack 928, win 59, options [nop,nop,TS val 437857068 ecr 379913], length 198
14:20:25.619606 IP 192.168.0.11.9001 > 94.51.162.84.35200: Flags [P.], seq 928:1194, ack 342, win 62, options [nop,nop,TS val 380065 ecr 437857068], length 266
14:20:28.024965 IP 192.168.0.11.9001 > 94.51.162.84.35200: Flags [P.], seq 928:1194, ack 342, win 62, options [nop,nop,TS val 380667 ecr 437857068], length 266
14:20:29.655430 IP 192.168.0.11.37183 > 212.27.40.240.53: 55970+ A? thuban.dyndns-free.com. (40)
14:20:29.781263 IP 212.27.40.240.53 > 192.168.0.11.37183: 55970 1/0/0 A 83.159.104.72 (56)
14:20:29.786538 IP 192.168.0.11.46450 > 212.27.40.240.53: 882+ A? thuban.dyndns-free.com. (40)
14:20:29.908876 IP 212.27.40.240.53 > 192.168.0.11.46450: 882 1/0/0 A 83.159.104.72 (56)
14:20:29.911102 IP 192.168.0.11.46097 > 212.27.40.240.53: 43138+ A? thuban.dyndns-free.com. (40)
14:20:30.036957 IP 212.27.40.240.53 > 192.168.0.11.46097: 43138 1/0/0 A 83.159.104.72 (56)
14:21:30.175966 IP 192.168.0.11.51301 > 212.27.40.240.53: 10481+ A? thuban.dyndns-free.com. (40)
14:21:30.214672 IP 212.27.40.240.53 > 192.168.0.11.51301: 10481 1/5/0 A 83.159.104.72 (156)
14:21:30.219864 IP 192.168.0.11.52877 > 212.27.40.240.53: 25972+ A? thuban.dyndns-free.com. (40)
14:21:30.229262 IP 67.205.112.82.9001 > 192.168.0.11.55151: Flags [.], ack 54844, win 496, options [nop,nop,TS val 3925032804 ecr 396182], length 0
14:21:30.25[/code]

J’ai épuré un peu, comme j’ai utilisé l’insterface pour naviguer…

Ben là je ne vois que du https, du http, des requêtes DNS et du traffic via Tor.

Essaye en faisant

tcpdump -n port ftp or port ftp-data

Voilà, tcpdump est de nouveau lancé avec les conseisl de fran.b :wink:

[quote]francois@totoche:~$ ftp ftp.thuban.dyndns-free.com
ftp: ftp.thuban.dyndns-free.com: Unknown host
ftp> quit
francois@totoche:~$ ftp thuban.dyndns-free.com
Connected to thuban.dyndns-free.com.
220 (vsFTPd 2.3.0)
Name (thuban.dyndns-free.com:francois): debianfr
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
200 PORT command successful. Consider using PASV.
150 Here comes the directory listing.
-rw-r–r-- 1 0 109 0 Aug 27 19:22 coucou_les_debianeux
226 Directory send OK.
ftp> quit
221 Goodbye.
francois@totoche:~$
[/quote]
par contre, comme prévu, le mode passif ne fonctionne pas:

[quote]francois@totoche:~$ ftp thuban.dyndns-free.com
Connected to thuban.dyndns-free.com.
220 (vsFTPd 2.3.0)
Name (thuban.dyndns-free.com:francois): debianfr
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> ls
227 Entering Passive Mode (83,159,104,72,249,41).
[/quote]

Bonjour,

Je viens d’essayé sur ma debian et … rien connexion pendant 10 sec puis déconnexion.
Pas de message d’erreur, mais pas de fichier visible.

Je viens d’essayer avec windaube et là, j’arrive à me connecter (lent la connexion 15 " pour l’authentification) j’accède un un fichier dont la taille est 0 !! (normale ?) Par contre je peux lire son nom … coucou …

Eh bien ça marche alors! Pourquoi personne n’y arrive à partir d’un navigateur? Voici le résultat de tcpdump au cas où :

[code]Script started on sam. 28 août 2010 15:05:28 CEST

root@Lothlorien:/home/xavier# tcpdump -i eth1 -n port ftp or port ftp-dat
ta > /tmp/ftpdebuhe[Ke[Ke[Ke[Ke[Ke[Ke[Ke[Ke[Ke[Ke[Ke[Ke[Ke[Ke[K
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 65535 bytes
15:15:49.268467 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [S], seq 319138454, win 5840, options [mss 1412,sackOK,TS val 6566747 ecr 0,nop,wscale 6], length 0
15:15:49.268691 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [S.], seq 3378954160, ack 319138455, win 5792, options [mss 1460,sackOK,TS val 1210978 ecr 6566747,nop,wscale 7], length 0
15:15:49.360391 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [.], ack 1, win 92, options [nop,nop,TS val 6566770 ecr 1210978], length 0
15:15:49.372969 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 1:21, ack 1, win 46, options [nop,nop,TS val 1211004 ecr 6566770], length 20
15:15:49.461241 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [.], ack 21, win 92, options [nop,nop,TS val 6566796 ecr 1211004], length 0
15:15:49.469349 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [P.], seq 1:16, ack 21, win 92, options [nop,nop,TS val 6566798 ecr 1211004], length 15
15:15:49.469435 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [.], ack 16, win 46, options [nop,nop,TS val 1211028 ecr 6566798], length 0
15:15:49.469715 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 21:55, ack 16, win 46, options [nop,nop,TS val 1211028 ecr 6566798], length 34
15:15:49.560592 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [P.], seq 16:28, ack 55, win 92, options [nop,nop,TS val 6566821 ecr 1211028], length 12
15:15:49.603077 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [.], ack 28, win 46, options [nop,nop,TS val 1211061 ecr 6566821], length 0
15:15:49.817883 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 55:78, ack 28, win 46, options [nop,nop,TS val 1211115 ecr 6566821], length 23
15:15:49.907475 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [P.], seq 28:34, ack 78, win 92, options [nop,nop,TS val 6566908 ecr 1211115], length 6
15:15:49.907582 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [.], ack 34, win 46, options [nop,nop,TS val 1211138 ecr 6566908], length 0
15:15:49.907887 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 78:93, ack 34, win 46, options [nop,nop,TS val 1211138 ecr 6566908], length 15
15:15:49.908114 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 93:100, ack 34, win 46, options [nop,nop,TS val 1211138 ecr 6566908], length 7
15:15:49.908219 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 100:107, ack 34, win 46, options [nop,nop,TS val 1211138 ecr 6566908], length 7
15:15:49.908305 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 107:114, ack 34, win 46, options [nop,nop,TS val 1211138 ecr 6566908], length 7
15:15:50.005319 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [.], ack 100, win 92, options [nop,nop,TS val 6566931 ecr 1211138], length 0
15:15:50.005441 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 114:165, ack 34, win 46, options [nop,nop,TS val 1211162 ecr 6566931], length 51
15:15:50.007520 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [.], ack 114, win 92, options [nop,nop,TS val 6566931 ecr 1211138], length 0
15:15:50.105169 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [P.], seq 34:48, ack 165, win 92, options [nop,nop,TS val 6566957 ecr 1211162], length 14
15:15:50.105422 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 165:191, ack 48, win 46, options [nop,nop,TS val 1211187 ecr 6566957], length 26
15:15:50.199585 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [P.], seq 48:53, ack 191, win 92, options [nop,nop,TS val 6566980 ecr 1211187], length 5
15:15:50.199913 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 191:200, ack 53, win 46, options [nop,nop,TS val 1211211 ecr 6566980], length 9
15:15:50.298475 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [P.], seq 53:61, ack 200, win 92, options [nop,nop,TS val 6567005 ecr 1211211], length 8
15:15:50.298708 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 200:230, ack 61, win 46, options [nop,nop,TS val 1211235 ecr 6567005], length 30
15:15:50.386113 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [P.], seq 61:67, ack 230, win 92, options [nop,nop,TS val 6567028 ecr 1211235], length 6
15:15:50.386750 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 230:280, ack 67, win 46, options [nop,nop,TS val 1211257 ecr 6567028], length 50
15:15:50.478950 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [P.], seq 67:73, ack 280, win 92, options [nop,nop,TS val 6567051 ecr 1211257], length 6
15:15:50.519109 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [.], ack 73, win 46, options [nop,nop,TS val 1211291 ecr 6567051], length 0
15:16:20.562076 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [P.], seq 73:79, ack 280, win 92, options [nop,nop,TS val 6574551 ecr 1211291], length 6
15:16:20.562262 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [.], ack 79, win 46, options [nop,nop,TS val 1218801 ecr 6574551], length 0
15:16:20.562451 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [F.], seq 79, ack 280, win 92, options [nop,nop,TS val 6574551 ecr 1211291], length 0
15:16:20.601992 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [.], ack 80, win 46, options [nop,nop,TS val 1218811 ecr 6574551], length 0
15:16:50.540726 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 280:317, ack 80, win 46, options [nop,nop,TS val 1226296 ecr 6574551], length 37
15:16:50.541973 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [P.], seq 317:331, ack 80, win 46, options [nop,nop,TS val 1226296 ecr 6574551], length 14
15:16:50.542091 IP 192.168.0.11.21 > 80.200.188.78.36014: Flags [F.], seq 331, ack 80, win 46, options [nop,nop,TS val 1226296 ecr 6574551], length 0
15:16:50.632950 IP 80.200.188.78.36014 > 192.168.0.11.21: Flags [R], seq 319138534, win 0, length 0
15:19:10.756110 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [S], seq 984242010, win 8192, options [mss 1412,nop,wscale 8,nop,nop,sackOK], length 0
15:19:10.756337 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [S.], seq 2234854574, ack 984242011, win 5840, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
15:19:10.839886 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 1, win 259, length 0
15:19:10.852864 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 1:21, ack 1, win 46, length 20
15:19:11.135363 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 21, win 259, length 0
15:19:15.175808 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 1:16, ack 21, win 259, length 15
15:19:15.175914 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [.], ack 16, win 46, length 0
15:19:15.176159 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 21:55, ack 16, win 46, length 34
15:19:15.565439 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 55, win 259, length 0
15:19:22.175824 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 16:28, ack 55, win 259, length 12
15:19:22.218969 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [.], ack 28, win 46, length 0
15:19:22.425982 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 55:78, ack 28, win 46, length 23
15:19:22.533754 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 28:34, ack 78, win 258, length 6
15:19:22.533847 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [.], ack 34, win 46, length 0
15:19:22.534064 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 78:97, ack 34, win 46, length 19
15:19:22.645827 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 34:40, ack 97, win 258, length 6
15:19:22.646046 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 97:112, ack 40, win 46, length 15
15:19:22.646137 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 112:119, ack 40, win 46, length 7
15:19:22.646239 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 119:126, ack 40, win 46, length 7
15:19:22.646317 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 126:133, ack 40, win 46, length 7
15:19:22.646448 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 133:140, ack 40, win 46, length 7
15:19:22.740754 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 119, win 258, length 0
15:19:22.740893 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 140:184, ack 40, win 46, length 44
15:19:22.751525 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 133, win 258, length 0
15:19:22.837774 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 184, win 258, length 0
15:19:22.873551 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 40:51, ack 184, win 258, length 11
15:19:22.873742 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 184:228, ack 51, win 46, length 44
15:19:22.873777 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 228:299, ack 51, win 46, length 71
15:19:22.873800 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 299:371, ack 51, win 46, length 72
15:19:22.873823 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 371:443, ack 51, win 46, length 72
15:19:22.873844 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 443:455, ack 51, win 46, length 12
15:19:22.873865 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 455:469, ack 51, win 46, length 14
15:19:22.959036 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 299, win 258, length 0
15:19:22.962821 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 443, win 257, length 0
15:19:22.963907 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 469, win 257, length 0
15:19:22.998039 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 51:65, ack 469, win 257, length 14
15:19:22.998245 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 469:495, ack 65, win 46, length 26
15:19:23.119619 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 65:70, ack 495, win 257, length 5
15:19:23.119887 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 495:504, ack 70, win 46, length 9
15:19:23.276358 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 70:78, ack 504, win 257, length 8
15:19:23.276627 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 504:534, ack 78, win 46, length 30
15:19:23.372300 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 78:84, ack 534, win 257, length 6
15:19:23.372636 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 534:584, ack 84, win 46, length 50
15:19:23.683608 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 584, win 256, length 0
15:19:44.513352 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 84:111, ack 584, win 256, length 27
15:19:44.513807 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 584:635, ack 111, win 46, length 51
15:19:44.610199 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 111:117, ack 635, win 256, length 6
15:19:44.649505 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [.], ack 117, win 46, length 0
15:19:44.701629 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 635:674, ack 117, win 46, length 39
15:19:44.990737 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 674, win 256, length 0
15:19:45.026445 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 674:698, ack 117, win 46, length 24
15:19:45.320121 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 698, win 256, length 0
15:19:50.140716 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 117:123, ack 698, win 256, length 6
15:19:50.140802 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [.], ack 123, win 46, length 0
15:19:50.141081 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 698:735, ack 123, win 46, length 37
15:19:50.236348 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 123:128, ack 735, win 256, length 5
15:19:50.236682 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 735:744, ack 128, win 46, length 9
15:19:50.687767 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 744, win 256, length 0
15:19:51.302269 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 128:134, ack 744, win 256, length 6
15:19:51.302527 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 744:781, ack 134, win 46, length 37
15:19:51.410184 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 134:139, ack 781, win 256, length 5
15:19:51.410408 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 781:790, ack 139, win 46, length 9
15:19:51.918525 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 790, win 256, length 0
15:20:02.416852 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 139:166, ack 790, win 256, length 27
15:20:02.417021 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 790:797, ack 166, win 46, length 7
15:20:02.510497 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 166:174, ack 797, win 256, length 8
15:20:02.510783 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 797:828, ack 174, win 46, length 31
15:20:02.604583 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 174:201, ack 828, win 256, length 27
15:20:02.605083 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 828:879, ack 201, win 46, length 51
15:20:02.697783 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [P.], seq 201:228, ack 879, win 255, length 27
15:20:02.735083 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [.], ack 228, win 46, length 0
15:20:02.784920 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 879:956, ack 228, win 46, length 77
15:20:02.872883 IP 192.168.0.11.21 > 80.200.188.78.4578: Flags [P.], seq 956:980, ack 228, win 46, length 24
15:20:02.958820 IP 80.200.188.78.4578 > 192.168.0.11.21: Flags [.], ack 980, win 255, length 0
15:20:43.147743 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [S], seq 2977283868, win 5840, options [mss 1412,sackOK,TS val 17154626 ecr 0,nop,wscale 7], length 0
15:20:43.148004 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [S.], seq 3696856031, ack 2977283869, win 5792, options [mss 1460,sackOK,TS val 1284448 ecr 17154626,nop,wscale 7], length 0
15:20:43.211010 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [.], ack 1, win 46, options [nop,nop,TS val 17154642 ecr 1284448], length 0
15:20:43.224487 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [P.], seq 1:21, ack 1, win 46, options [nop,nop,TS val 1284467 ecr 17154642], length 20
15:20:43.285964 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [.], ack 21, win 46, options [nop,nop,TS val 17154661 ecr 1284467], length 0
15:20:55.814518 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [P.], seq 1:16, ack 21, win 46, options [nop,nop,TS val 17157727 ecr 1284467], length 15
15:20:55.814732 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [.], ack 16, win 46, options [nop,nop,TS val 1287614 ecr 17157727], length 0
15:20:55.814962 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [P.], seq 1:16, ack 21, win 46, options [nop,nop,TS val 17157793 ecr 1284467], length 15
15:20:55.815050 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [.], ack 16, win 46, options [nop,nop,TS val 1287615 ecr 17157793,nop,nop,sack 1 {1:16}], length 0
15:20:55.815435 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [P.], seq 21:55, ack 16, win 46, options [nop,nop,TS val 1287615 ecr 17157793], length 34
15:20:55.878950 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [.], ack 55, win 46, options [nop,nop,TS val 17157809 ecr 1287615], length 0
15:21:03.187632 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [P.], seq 16:28, ack 55, win 46, options [nop,nop,TS val 17159597 ecr 1287615], length 12
15:21:03.228062 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [.], ack 28, win 46, options [nop,nop,TS val 1289468 ecr 17159597], length 0
15:21:03.428081 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [P.], seq 55:78, ack 28, win 46, options [nop,nop,TS val 1289518 ecr 17159597], length 23
15:21:03.488369 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [.], ack 78, win 46, options [nop,nop,TS val 17159712 ecr 1289518], length 0
15:21:03.488605 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [P.], seq 28:34, ack 78, win 46, options [nop,nop,TS val 17159712 ecr 1289518], length 6
15:21:03.488700 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [.], ack 34, win 46, options [nop,nop,TS val 1289533 ecr 17159712], length 0
15:21:03.489348 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [P.], seq 78:97, ack 34, win 46, options [nop,nop,TS val 1289533 ecr 17159712], length 19
15:21:03.587853 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [.], ack 97, win 46, options [nop,nop,TS val 17159737 ecr 1289533], length 0
15:21:05.645440 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [P.], seq 34:61, ack 97, win 46, options [nop,nop,TS val 17160192 ecr 1289533], length 27
15:21:05.645944 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [P.], seq 97:148, ack 61, win 46, options [nop,nop,TS val 1290072 ecr 17160192], length 51
15:21:05.706696 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [.], ack 148, win 46, options [nop,nop,TS val 17160267 ecr 1290072], length 0
15:21:05.707663 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [P.], seq 61:67, ack 148, win 46, options [nop,nop,TS val 17160267 ecr 1290072], length 6
15:21:05.748084 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [.], ack 67, win 46, options [nop,nop,TS val 1290098 ecr 17160267], length 0
15:21:05.769227 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [P.], seq 148:187, ack 67, win 46, options [nop,nop,TS val 1290103 ecr 17160267], length 39
15:21:05.832779 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [P.], seq 187:211, ack 67, win 46, options [nop,nop,TS val 1290119 ecr 17160267], length 24
15:21:05.866439 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [.], ack 187, win 46, options [nop,nop,TS val 17160307 ecr 1290103], length 0
15:21:05.891200 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [.], ack 211, win 46, options [nop,nop,TS val 17160313 ecr 1290119], length 0
15:21:12.096127 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [P.], seq 67:73, ack 211, win 46, options [nop,nop,TS val 17161848 ecr 1290119], length 6
15:21:12.096267 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [.], ack 73, win 46, options [nop,nop,TS val 1291685 ecr 17161848], length 0
15:21:12.096563 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [P.], seq 211:225, ack 73, win 46, options [nop,nop,TS val 1291685 ecr 17161848], length 14
15:21:12.096792 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [F.], seq 225, ack 73, win 46, options [nop,nop,TS val 1291685 ecr 17161848], length 0
15:21:12.155462 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [.], ack 225, win 46, options [nop,nop,TS val 17161879 ecr 1291685], length 0
15:21:12.156273 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [F.], seq 73, ack 225, win 46, options [nop,nop,TS val 17161879 ecr 1291685], length 0
15:21:12.156347 IP 192.168.0.11.21 > 82.66.248.156.37069: Flags [.], ack 74, win 46, options [nop,nop,TS val 1291700 ecr 17161879], length 0
15:21:12.156672 IP 82.66.248.156.37069 > 192.168.0.11.21: Flags [.], ack 226, win 46, options [nop,nop,TS val 17161879 ecr 1291685], length 0
15:21:44.849378 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [S], seq 3933333042, win 5840, options [mss 1412,sackOK,TS val 17170051 ecr 0,nop,wscale 7], length 0
15:21:44.849527 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [S.], seq 352374106, ack 3933333043, win 5792, options [mss 1460,sackOK,TS val 1299873 ecr 17170051,nop,wscale 7], length 0
15:21:44.915211 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 1, win 46, options [nop,nop,TS val 17170067 ecr 1299873], length 0
15:21:44.928652 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 1:21, ack 1, win 46, options [nop,nop,TS val 1299893 ecr 17170067], length 20
15:21:44.993891 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 21, win 46, options [nop,nop,TS val 17170087 ecr 1299893], length 0
15:21:51.725182 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [P.], seq 1:16, ack 21, win 46, options [nop,nop,TS val 17171739 ecr 1299893], length 15
15:21:51.725329 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [.], ack 16, win 46, options [nop,nop,TS val 1301592 ecr 17171739], length 0
15:21:51.725640 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 21:55, ack 16, win 46, options [nop,nop,TS val 1301592 ecr 17171739], length 34
15:21:51.789161 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 55, win 46, options [nop,nop,TS val 17171787 ecr 1301592], length 0
15:21:56.486299 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [P.], seq 16:28, ack 55, win 46, options [nop,nop,TS val 17172962 ecr 1301592], length 12
15:21:56.522990 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [.], ack 28, win 46, options [nop,nop,TS val 1302792 ecr 17172962], length 0
15:21:56.666318 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 55:78, ack 28, win 46, options [nop,nop,TS val 1302827 ecr 17172962], length 23
15:21:56.724950 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 78, win 46, options [nop,nop,TS val 17173022 ecr 1302827], length 0
15:21:56.726549 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [P.], seq 28:34, ack 78, win 46, options [nop,nop,TS val 17173022 ecr 1302827], length 6
15:21:56.726660 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [.], ack 34, win 46, options [nop,nop,TS val 1302842 ecr 17173022], length 0
15:21:56.726997 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 78:97, ack 34, win 46, options [nop,nop,TS val 1302842 ecr 17173022], length 19
15:21:56.826656 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 97, win 46, options [nop,nop,TS val 17173047 ecr 1302842], length 0
15:21:58.176279 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [P.], seq 34:62, ack 97, win 46, options [nop,nop,TS val 17173366 ecr 1302842], length 28
15:21:58.176844 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 97:148, ack 62, win 46, options [nop,nop,TS val 1303205 ecr 17173366], length 51
15:21:58.239256 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 148, win 46, options [nop,nop,TS val 17173399 ecr 1303205], length 0
15:21:58.240588 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [P.], seq 62:68, ack 148, win 46, options [nop,nop,TS val 17173399 ecr 1303205], length 6
15:21:58.280619 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [.], ack 68, win 46, options [nop,nop,TS val 1303231 ecr 17173399], length 0
15:21:58.300568 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 148:187, ack 68, win 46, options [nop,nop,TS val 1303236 ecr 17173399], length 39
15:21:58.362397 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 187:211, ack 68, win 46, options [nop,nop,TS val 1303251 ecr 17173399], length 24
15:21:58.397145 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 187, win 46, options [nop,nop,TS val 17173440 ecr 1303236], length 0
15:21:58.422110 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 211, win 46, options [nop,nop,TS val 17173446 ecr 1303251], length 0
15:22:04.013210 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [P.], seq 68:76, ack 211, win 46, options [nop,nop,TS val 17174784 ecr 1303251], length 8
15:22:04.013348 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [.], ack 76, win 46, options [nop,nop,TS val 1304664 ecr 17174784], length 0
15:22:04.013638 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 211:242, ack 76, win 46, options [nop,nop,TS val 1304664 ecr 17174784], length 31
15:22:04.072911 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 242, win 46, options [nop,nop,TS val 17174858 ecr 1304664], length 0
15:22:04.074638 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [P.], seq 76:103, ack 242, win 46, options [nop,nop,TS val 17174859 ecr 1304664], length 27
15:22:04.074895 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 242:293, ack 103, win 46, options [nop,nop,TS val 1304679 ecr 17174859], length 51
15:22:04.134752 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [P.], seq 103:130, ack 293, win 46, options [nop,nop,TS val 17174874 ecr 1304679], length 27
15:22:04.171085 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [.], ack 130, win 46, options [nop,nop,TS val 1304704 ecr 17174874], length 0
15:22:04.195565 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 293:370, ack 130, win 46, options [nop,nop,TS val 1304710 ecr 17174874], length 77
15:22:04.255964 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 370:394, ack 130, win 46, options [nop,nop,TS val 1304725 ecr 17174874], length 24
15:22:04.293612 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 370, win 46, options [nop,nop,TS val 17174914 ecr 1304710], length 0
15:22:04.314832 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 394, win 46, options [nop,nop,TS val 17174919 ecr 1304725], length 0
15:22:07.699671 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [P.], seq 130:136, ack 394, win 46, options [nop,nop,TS val 17175750 ecr 1304725], length 6
15:22:07.699790 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [.], ack 136, win 46, options [nop,nop,TS val 1305586 ecr 17175750], length 0
15:22:07.700074 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [P.], seq 394:408, ack 136, win 46, options [nop,nop,TS val 1305586 ecr 17175750], length 14
15:22:07.700199 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [F.], seq 408, ack 136, win 46, options [nop,nop,TS val 1305586 ecr 17175750], length 0
15:22:07.759064 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 408, win 46, options [nop,nop,TS val 17175780 ecr 1305586], length 0
15:22:07.759673 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [F.], seq 136, ack 408, win 46, options [nop,nop,TS val 17175780 ecr 1305586], length 0
15:22:07.759779 IP 192.168.0.11.21 > 82.66.248.156.37072: Flags [.], ack 137, win 46, options [nop,nop,TS val 1305601 ecr 17175780], length 0
15:22:07.760891 IP 82.66.248.156.37072 > 192.168.0.11.21: Flags [.], ack 409, win 46, options [nop,nop,TS val 17175780 ecr 1305586], length 0
15:22:55.624000 IP 82.66.248.156.45182 > 192.168.0.11.21: Flags [S], seq 763584593, win 5840, options [mss 1412,sackOK,TS val 17187675 ecr 0,nop,wscale 7], length 0
15:22:55.624120 IP 192.168.0.11.21 > 82.66.248.156.45182: Flags [S.], seq 1471262511, ack 763584594, win 5792, options [mss 1460,sackOK,TS val 1317567 ecr 17187675,nop,wscale 7], length 0
15:22:55.684122 IP 82.66.248.156.45182 > 192.168.0.11.21: Flags [.], ack 1, win 46, options [nop,nop,TS val 17187761 ecr 1317567], length 0
15:22:55.699082 IP 192.168.0.11.21 > 82.66.248.156.45182: Flags [P.], seq 1:21, ack 1, win 46, options [nop,nop,TS val 1317585 ecr 17187761], length 20
15:22:55.758762 IP 82.66.248.156.45182 > 192.168.0.11.21: Flags [.], ack 21, win 46, options [nop,nop,TS val 17187780 ecr 1317585], length 0
^C
199 packets captured
199 packets received by filter
0 packets dropped by kernel
[/code]

Oui, le fichier est vide, c’est normal.
Je ne comprend pas, je n’ai rien changé…

Le mode passif, je n’en ai pas besoin à priori, seules les personnes autorisées peuvent s’y connecter.

ben tout va bien, je reconnais mon IP par contre je ne vois pas le dialogue avec ftp-data mais il a eu lieu. Ton ftp marche en mode actif sans problème. Si tu veux le faire marcher en mode passif, ou tu mets ton serveur en DMZ ou tu fais un renvoi d’une plage de port et tu paramètres ton serveur en fonction.
Attention, la plupart des personnes sous windows interdisent les connexions entrantes et donc le ftp en mode actif (ou le port 20 du serveur initie une connexion sur le client). Ça peut être une raison.

Et via un navigateur web, il faut le mode passif c’est ça?
En tout cas, merci beaucoup d’avoir testé.

La plupart du temps, oui. Je suis en train de le faire sur iceweasel et il est en passif par défaut.

Voilà, j’ai modifié la config du serveur, à priori, le mode passif marche, si vous voulez bien tester ?
Merci pour tout!

edit : mine de rien, je me demande à quoi sert un parefeu, avec le nombre de ports qui ont du etre ouverts… :confused: