head 1.1; branch 1.1.1; access; symbols netbsd-11-0-RC4:1.1.1.2 netbsd-11-0-RC3:1.1.1.2 tcpdump-4-99-6:1.1.1.2 netbsd-11-0-RC2:1.1.1.2 netbsd-11-0-RC1:1.1.1.2 perseant-exfatfs-base-20250801:1.1.1.2 netbsd-11:1.1.1.2.0.2 netbsd-11-base:1.1.1.2 tcpdump-4-99-5:1.1.1.2 perseant-exfatfs-base-20240630:1.1.1.1 perseant-exfatfs:1.1.1.1.0.2 perseant-exfatfs-base:1.1.1.1 tcpdump-4-99-4:1.1.1.1 TCPDUMP:1.1.1; locks; strict; comment @# @; 1.1 date 2023.08.17.15.57.20; author christos; state Exp; branches 1.1.1.1; next ; commitid 6SL2uKbgSix3J9BE; 1.1.1.1 date 2023.08.17.15.57.20; author christos; state Exp; branches 1.1.1.1.2.1; next 1.1.1.2; commitid 6SL2uKbgSix3J9BE; 1.1.1.2 date 2024.09.02.15.50.10; author christos; state Exp; branches; next ; commitid E0666bfLa9iupfoF; 1.1.1.1.2.1 date 2025.08.02.05.23.48; author perseant; state Exp; branches; next ; commitid 23j6GFaDws3O875G; desc @@ 1.1 log @Initial revision @ text @ 1 15:52:49.322823 IP (tos 0x0, ttl 64, id 348, offset 0, flags [DF], proto TCP (6), length 236) 127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfee0 (incorrect -> 0x21d3), seq 3305197767:3305197951, ack 3938018648, win 100, options [nop,nop,TS val 534888 ecr 533649], length 184: OpenFlow version 1.3, type FLOW_MOD, length 184, xid 0x00000199 2 15:52:49.362355 IP (tos 0x0, ttl 64, id 61731, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1ad3), ack 184, win 98, options [nop,nop,TS val 534898 ecr 534888], length 0 3 15:52:49.367093 IP (tos 0x0, ttl 64, id 349, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.35359: Flags [P.], cksum 0xfe30 (incorrect -> 0x1512), seq 184:192, ack 1, win 100, options [nop,nop,TS val 534899 ecr 534898], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x0000019a 4 15:52:49.367137 IP (tos 0x0, ttl 64, id 61732, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.35359 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x1abf), ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 0 5 15:52:49.367403 IP (tos 0x0, ttl 64, id 61733, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.35359 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x150a), seq 1:9, ack 192, win 98, options [nop,nop,TS val 534899 ecr 534899], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x0000019a 6 15:52:49.367421 IP (tos 0x0, ttl 64, id 350, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.35359: Flags [.], cksum 0xfe28 (incorrect -> 0x1ab5), ack 9, win 100, options [nop,nop,TS val 534899 ecr 534899], length 0 7 12:15:37.979676 IP (tos 0x0, ttl 64, id 46225, offset 0, flags [DF], proto TCP (6), length 420) 127.0.0.1.6633 > 127.0.0.1.43230: Flags [P.], cksum 0xff98 (incorrect -> 0xd79d), seq 402287444:402287812, ack 1282739451, win 98, options [nop,nop,TS val 2953476 ecr 2952724], length 368: OpenFlow version 1.3, type FLOW_MOD, length 368, xid 0x00000012 8 12:15:37.985455 IP (tos 0x0, ttl 64, id 55504, offset 0, flags [DF], proto TCP (6), length 432) 127.0.0.1.43230 > 127.0.0.1.6633: Flags [P.], cksum 0xffa4 (incorrect -> 0xcda4), seq 1:381, ack 368, win 90, options [nop,nop,TS val 2953478 ecr 2953476], length 380: OpenFlow version 1.3, type ERROR, length 380, xid 0x00000012 type BAD_ACTION, code BAD_EXPERIMENTER data (368 octets) 9 12:15:37.985482 IP (tos 0x0, ttl 64, id 46226, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.43230: Flags [.], cksum 0xfe28 (incorrect -> 0xb37b), ack 381, win 103, options [nop,nop,TS val 2953478 ecr 2953478], length 0 10 14:53:56.336558 IP (tos 0x0, ttl 64, id 63838, offset 0, flags [DF], proto TCP (6), length 172) 127.0.0.1.6633 > 127.0.0.1.56562: Flags [P.], cksum 0xfea0 (incorrect -> 0x8c0a), seq 4055369935:4055370055, ack 963939871, win 94, options [nop,nop,TS val 3963146 ecr 3962600], length 120: OpenFlow version 1.3, type GROUP_MOD, length 120, xid 0x0000008a 11 14:53:56.339805 IP (tos 0x0, ttl 64, id 30929, offset 0, flags [DF], proto TCP (6), length 184) 127.0.0.1.56562 > 127.0.0.1.6633: Flags [P.], cksum 0xfeac (incorrect -> 0x8455), seq 1:133, ack 120, win 86, options [nop,nop,TS val 3963147 ecr 3963146], length 132: OpenFlow version 1.3, type ERROR, length 132, xid 0x0000008a type GROUP_MOD_FAILED, code INVALID_GROUP data (120 octets) 12 14:53:56.339839 IP (tos 0x0, ttl 64, id 63839, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.56562: Flags [.], cksum 0xfe28 (incorrect -> 0xcbd6), ack 133, win 98, options [nop,nop,TS val 3963147 ecr 3963147], length 0 13 07:06:07.923021 IP (tos 0x0, ttl 64, id 53050, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.56439 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x17bd), seq 2797182347, win 43690, options [mss 65495,sackOK,TS val 1659569 ecr 0,nop,wscale 9], length 0 14 07:06:07.923406 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) 127.0.0.1.6633 > 127.0.0.1.56439: Flags [R.], cksum 0x7727 (correct), seq 0, ack 2797182348, win 0, length 0 15 07:06:11.948050 IP (tos 0x0, ttl 64, id 25056, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.56440 > 127.0.0.1.6633: Flags [S], cksum 0xfe30 (incorrect -> 0x9014), seq 2428319552, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 0,nop,wscale 9], length 0 16 07:06:11.948123 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.56440: Flags [S.], cksum 0xfe30 (incorrect -> 0xf3ee), seq 2308881340, ack 2428319553, win 43690, options [mss 65495,sackOK,TS val 1660576 ecr 1660576,nop,wscale 9], length 0 17 07:06:11.948171 IP (tos 0x0, ttl 64, id 25057, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc735), ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0 18 07:06:11.948588 IP (tos 0x0, ttl 64, id 25058, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc10f), seq 1:9, ack 1, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 8: OpenFlow version 1.3, type HELLO, length 8, xid 0x83ea7e23 19 07:06:11.948646 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc72d), ack 9, win 86, options [nop,nop,TS val 1660576 ecr 1660576], length 0 20 07:06:11.951581 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0x5426), seq 1:9, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660576], length 8: OpenFlow version 1.0, type HELLO, length 8, xid 0x95b6dc37 21 07:06:11.951654 IP (tos 0x0, ttl 64, id 25059, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.56440 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc723), ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 0 22 07:06:11.954851 IP (tos 0x0, ttl 64, id 25060, offset 0, flags [DF], proto TCP (6), length 150) 127.0.0.1.56440 > 127.0.0.1.6633: Flags [P.], cksum 0xfe8a (incorrect -> 0x83b9), seq 9:107, ack 9, win 86, options [nop,nop,TS val 1660577 ecr 1660577], length 98: OpenFlow version 1.3, type ERROR, length 98, xid 0xc4420f26 type HELLO_FAILED, code INCOMPATIBLE data (86 octets) 23 07:06:11.956875 IP (tos 0x0, ttl 64, id 25061, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.56440 > 127.0.0.1.6633: Flags [F.], cksum 0xfe28 (incorrect -> 0xc6bf), seq 107, ack 9, win 86, options [nop,nop,TS val 1660578 ecr 1660577], length 0 24 07:06:11.995263 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.56440: Flags [.], cksum 0xfe28 (incorrect -> 0xc6b5), ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 0 25 07:06:11.996996 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.56440: Flags [P.], cksum 0xfe30 (incorrect -> 0xc22e), seq 9:17, ack 108, win 86, options [nop,nop,TS val 1660588 ecr 1660577], length 8: OpenFlow version 1.0, type FEATURES_REQUEST, length 8, xid 0x852f7e3a 26 07:06:11.997117 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) 127.0.0.1.56440 > 127.0.0.1.6633: Flags [R], cksum 0xf312 (correct), seq 2428319660, win 0, length 0 27 20:23:02.447284 IP (tos 0x0, ttl 64, id 5822, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc972), seq 3295811422:3295811430, ack 623716506, win 94, options [nop,nop,TS val 683124 ecr 682086], length 8: OpenFlow version 1.3, type HELLO, length 8, xid 0x0000015f 28 20:23:02.487886 IP (tos 0x0, ttl 64, id 541, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xcad0), ack 8, win 86, options [nop,nop,TS val 683135 ecr 683124], length 0 29 20:23:03.289931 IP (tos 0x0, ttl 64, id 5823, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe30 (incorrect -> 0xc47b), seq 8:16, ack 1, win 94, options [nop,nop,TS val 683335 ecr 683135], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x00000160 30 20:23:03.290134 IP (tos 0x0, ttl 64, id 542, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc92d), ack 16, win 86, options [nop,nop,TS val 683335 ecr 683335], length 0 31 20:23:03.292620 IP (tos 0x0, ttl 64, id 543, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.37123 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xc3b1), seq 1:9, ack 16, win 86, options [nop,nop,TS val 683336 ecr 683335], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x00000160 32 20:23:03.292690 IP (tos 0x0, ttl 64, id 5824, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.37123: Flags [.], cksum 0xfe28 (incorrect -> 0xc91b), ack 9, win 94, options [nop,nop,TS val 683336 ecr 683336], length 0 33 20:23:03.674363 IP (tos 0x0, ttl 64, id 5825, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.37123: Flags [P.], cksum 0xfe38 (incorrect -> 0xc315), seq 16:32, ack 9, win 94, options [nop,nop,TS val 683431 ecr 683336], length 16: OpenFlow version 1.3, type HELLO, length 16, xid 0x00000161 type VERSIONBITMAP, length 8, bitmap 0x00000015 (1.0, 1.2, 1.4) 34 20:23:03.711246 IP (tos 0x0, ttl 64, id 544, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.37123 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xc84b), ack 32, win 86, options [nop,nop,TS val 683441 ecr 683431], length 0 35 09:18:28.508689 IP (tos 0x0, ttl 64, id 8726, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe30 (incorrect -> 0x5466), seq 2774334230:2774334238, ack 3518786755, win 94, options [nop,nop,TS val 2174690 ecr 2173441], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x0000004d 36 09:18:28.512206 IP (tos 0x0, ttl 64, id 48675, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4f83), seq 1:9, ack 8, win 86, options [nop,nop,TS val 2174691 ecr 2174690], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x0000004d 37 09:18:28.512310 IP (tos 0x0, ttl 64, id 8727, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x53da), ack 9, win 94, options [nop,nop,TS val 2174691 ecr 2174691], length 0 38 09:18:29.938866 IP (tos 0x0, ttl 64, id 8728, offset 0, flags [DF], proto TCP (6), length 73) 127.0.0.1.6633 > 127.0.0.1.52621: Flags [P.], cksum 0xfe3d (incorrect -> 0x23cf), seq 8:29, ack 9, win 94, options [nop,nop,TS val 2175048 ecr 2174691], length 21: OpenFlow version 1.3, type ECHO_REQUEST, length 21, xid 0x0000004e data (13 octets) 39 09:18:29.940525 IP (tos 0x0, ttl 64, id 48676, offset 0, flags [DF], proto TCP (6), length 73) 127.0.0.1.52621 > 127.0.0.1.6633: Flags [P.], cksum 0xfe3d (incorrect -> 0x225c), seq 9:30, ack 29, win 86, options [nop,nop,TS val 2175048 ecr 2175048], length 21: OpenFlow version 1.3, type ECHO_REPLY, length 21, xid 0x0000004e data (13 octets) 40 09:18:29.940621 IP (tos 0x0, ttl 64, id 8729, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.52621: Flags [.], cksum 0xfe28 (incorrect -> 0x50e6), ack 30, win 94, options [nop,nop,TS val 2175048 ecr 2175048], length 0 41 15:41:10.777155 IP (tos 0x0, ttl 64, id 14454, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe38 (incorrect -> 0x994a), seq 2142345193:2142345209, ack 115176160, win 94, options [nop,nop,TS val 175830 ecr 174634], length 16: OpenFlow version 1.3, type EXPERIMENTER, length 16, xid 0x00000041 experimenter 0x00d0f0db (Ericsson), exp_type 0x00000065 42 15:41:10.782182 IP (tos 0x0, ttl 64, id 51401, offset 0, flags [DF], proto TCP (6), length 80) 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe44 (incorrect -> 0x9024), seq 1:29, ack 16, win 86, options [nop,nop,TS val 175831 ecr 175830], length 28: OpenFlow version 1.3, type ERROR, length 28, xid 0x00000041 type BAD_REQUEST, code BAD_LEN data (16 octets) 43 15:41:10.782279 IP (tos 0x0, ttl 64, id 14455, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8aee), ack 29, win 94, options [nop,nop,TS val 175831 ecr 175831], length 0 44 15:41:10.978145 IP (tos 0x0, ttl 64, id 14456, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0x8661), seq 16:24, ack 29, win 94, options [nop,nop,TS val 175880 ecr 175831], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x00000042 45 15:41:10.981725 IP (tos 0x0, ttl 64, id 51402, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x862e), seq 29:37, ack 24, win 86, options [nop,nop,TS val 175881 ecr 175880], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x00000042 46 15:41:10.981828 IP (tos 0x0, ttl 64, id 14457, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x8a7a), ack 37, win 94, options [nop,nop,TS val 175881 ecr 175881], length 0 47 15:41:11.640555 IP (tos 0x0, ttl 64, id 14458, offset 0, flags [DF], proto TCP (6), length 85) 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe49 (incorrect -> 0x4af3), seq 24:57, ack 37, win 94, options [nop,nop,TS val 176046 ecr 175881], length 33: OpenFlow version 1.3, type EXPERIMENTER, length 33, xid 0x00000043 experimenter 0x00d0f0db (Ericsson), exp_type 0x00000065 data (17 octets) 48 15:41:11.649632 IP (tos 0x0, ttl 64, id 51403, offset 0, flags [DF], proto TCP (6), length 97) 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe55 (incorrect -> 0x45af), seq 37:82, ack 57, win 86, options [nop,nop,TS val 176048 ecr 176046], length 45: OpenFlow version 1.3, type ERROR, length 45, xid 0x00000043 type BAD_REQUEST, code BAD_LEN data (33 octets) 49 15:41:11.649721 IP (tos 0x0, ttl 64, id 14459, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0x88de), ack 82, win 94, options [nop,nop,TS val 176048 ecr 176048], length 0 50 15:47:18.960105 IP (tos 0x0, ttl 64, id 14608, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.58445: Flags [P.], cksum 0xfe30 (incorrect -> 0xb4f6), seq 649:657, ack 698, win 94, options [nop,nop,TS val 267876 ecr 267134], length 8: OpenFlow version 1.3, type FEATURES_REQUEST, length 8, xid 0x0000008e 51 15:47:18.962238 IP (tos 0x0, ttl 64, id 51478, offset 0, flags [DF], proto TCP (6), length 84) 127.0.0.1.58445 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xbbc3), seq 698:730, ack 657, win 86, options [nop,nop,TS val 267876 ecr 267876], length 32: OpenFlow version 1.3, type FEATURES_REPLY, length 32, xid 0x0000008e dpid 0x000026a2b46fd9ba, n_buffers 256, n_tables 64, auxiliary_id 0 capabilities 0x0000004f (FLOW_STATS, TABLE_STATS, PORT_STATS, GROUP_STATS, QUEUE_STATS) 52 15:47:18.962333 IP (tos 0x0, ttl 64, id 14609, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.58445: Flags [.], cksum 0xfe28 (incorrect -> 0xb693), ack 730, win 94, options [nop,nop,TS val 267876 ecr 267876], length 0 53 16:32:34.623939 IP (tos 0x0, ttl 64, id 44797, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3d62), seq 2583631865:2583631873, ack 3924671623, win 94, options [nop,nop,TS val 946792 ecr 945543], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002e 54 16:32:34.625658 IP (tos 0x0, ttl 64, id 3493, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3880), seq 1:9, ack 8, win 86, options [nop,nop,TS val 946792 ecr 946792], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x0000002e 55 16:32:34.625750 IP (tos 0x0, ttl 64, id 44798, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x3cb9), ack 9, win 94, options [nop,nop,TS val 946792 ecr 946792], length 0 56 16:32:34.844806 IP (tos 0x0, ttl 64, id 44799, offset 0, flags [DF], proto TCP (6), length 64) 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe34 (incorrect -> 0x3760), seq 8:20, ack 9, win 94, options [nop,nop,TS val 946847 ecr 946792], length 12: OpenFlow version 1.3, type SET_CONFIG, length 12, xid 0x0000002f flags FRAG_REASM, miss_send_len 200 57 16:32:34.883698 IP (tos 0x0, ttl 64, id 3494, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3c3d), ack 20, win 86, options [nop,nop,TS val 946857 ecr 946847], length 0 58 16:32:36.376083 IP (tos 0x0, ttl 64, id 44800, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.58447: Flags [P.], cksum 0xfe30 (incorrect -> 0x3667), seq 20:28, ack 9, win 94, options [nop,nop,TS val 947230 ecr 946857], length 8: OpenFlow version 1.3, type GET_CONFIG_REQUEST, length 8, xid 0x00000030 59 16:32:36.376174 IP (tos 0x0, ttl 64, id 3495, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.58447 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x3941), ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 0 60 16:32:36.378403 IP (tos 0x0, ttl 64, id 3496, offset 0, flags [DF], proto TCP (6), length 64) 127.0.0.1.58447 > 127.0.0.1.6633: Flags [P.], cksum 0xfe34 (incorrect -> 0x3420), seq 9:21, ack 28, win 86, options [nop,nop,TS val 947230 ecr 947230], length 12: OpenFlow version 1.3, type GET_CONFIG_REPLY, length 12, xid 0x00000030 flags FRAG_DROP, miss_send_len 200 61 16:32:36.378465 IP (tos 0x0, ttl 64, id 44801, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.58447: Flags [.], cksum 0xfe28 (incorrect -> 0x392d), ack 21, win 94, options [nop,nop,TS val 947230 ecr 947230], length 0 62 17:39:10.589931 IP (tos 0x0, ttl 64, id 28700, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe30 (incorrect -> 0x4e78), seq 359193673:359193681, ack 3843617605, win 111, options [nop,nop,TS val 1945783 ecr 1944534], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x000000a6 63 17:39:10.592125 IP (tos 0x0, ttl 64, id 24186, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x49a6), seq 1:9, ack 8, win 86, options [nop,nop,TS val 1945784 ecr 1945783], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x000000a6 64 17:39:10.592223 IP (tos 0x0, ttl 64, id 28701, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4e45), ack 9, win 111, options [nop,nop,TS val 1945784 ecr 1945784], length 0 65 17:39:11.275605 IP (tos 0x0, ttl 64, id 28702, offset 0, flags [DF], proto TCP (6), length 152) 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xaa9b), seq 8:108, ack 9, win 111, options [nop,nop,TS val 1945955 ecr 1945784], length 100: OpenFlow version 1.3, type PACKET_OUT, length 100, xid 0x000000a7 66 17:39:11.278453 IP (tos 0x0, ttl 64, id 24187, offset 0, flags [DF], proto TCP (6), length 206) 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfec2 (incorrect -> 0xa12e), seq 9:163, ack 108, win 86, options [nop,nop,TS val 1945955 ecr 1945955], length 154: OpenFlow version 1.3, type PACKET_IN, length 154, xid 0x00000000 67 17:39:11.278747 IP (tos 0x0, ttl 64, id 28703, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4bec), ack 163, win 115, options [nop,nop,TS val 1945956 ecr 1945955], length 0 68 17:39:11.293620 IP (tos 0x0, ttl 64, id 28704, offset 0, flags [DF], proto TCP (6), length 152) 127.0.0.1.6633 > 127.0.0.1.58449: Flags [P.], cksum 0xfe8c (incorrect -> 0xa8c9), seq 108:208, ack 163, win 115, options [nop,nop,TS val 1945959 ecr 1945955], length 100: OpenFlow version 1.3, type PACKET_OUT, length 100, xid 0x000000a8 69 17:39:11.296836 IP (tos 0x0, ttl 64, id 24188, offset 0, flags [DF], proto TCP (6), length 234) 127.0.0.1.58449 > 127.0.0.1.6633: Flags [P.], cksum 0xfede (incorrect -> 0x2262), seq 163:345, ack 208, win 86, options [nop,nop,TS val 1945960 ecr 1945959], length 182: OpenFlow version 1.3, type PACKET_IN, length 182, xid 0x00000000 70 17:39:11.334896 IP (tos 0x0, ttl 64, id 28705, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.58449: Flags [.], cksum 0xfe28 (incorrect -> 0x4abb), ack 345, win 119, options [nop,nop,TS val 1945970 ecr 1945960], length 0 71 10:22:45.030583 IP (tos 0x0, ttl 64, id 10058, offset 0, flags [DF], proto TCP (6), length 148) 127.0.0.1.6633 > 127.0.0.1.53146: Flags [P.], cksum 0xfe88 (incorrect -> 0xf671), seq 1089079797:1089079893, ack 1672614427, win 94, options [nop,nop,TS val 4009818 ecr 4009376], length 96: OpenFlow version 1.3, type FLOW_MOD, length 96, xid 0x00000076 72 10:22:45.067011 IP (tos 0x0, ttl 64, id 11330, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.53146 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x6e9c), ack 96, win 86, options [nop,nop,TS val 4009828 ecr 4009818], length 0 73 10:22:46.038093 IP (tos 0x0, ttl 64, id 11331, offset 0, flags [DF], proto TCP (6), length 116) 127.0.0.1.53146 > 127.0.0.1.6633: Flags [P.], cksum 0xfe68 (incorrect -> 0xdcd4), seq 1:65, ack 96, win 86, options [nop,nop,TS val 4010070 ecr 4009818], length 64: OpenFlow version 1.3, type FLOW_REMOVED, length 64, xid 0x00000000 74 10:22:46.038127 IP (tos 0x0, ttl 64, id 10059, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.53146: Flags [.], cksum 0xfe28 (incorrect -> 0x6c66), ack 65, win 94, options [nop,nop,TS val 4010070 ecr 4010070], length 0 75 13:15:24.725748 IP (tos 0x0, ttl 64, id 51120, offset 0, flags [DF], proto TCP (6), length 132) 127.0.0.1.38906 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xadc3), seq 2781543975:2781544055, ack 1865664008, win 86, options [nop,nop,TS val 1794904 ecr 1794249], length 80: OpenFlow version 1.3, type PORT_STATUS, length 80, xid 0x00000000 reason ADD port_no 2, hw_addr ca:02:9f:af:e9:1c, name 'veth0' 76 13:15:24.725788 IP (tos 0x0, ttl 64, id 64306, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.38906: Flags [.], cksum 0xfe28 (incorrect -> 0x2614), ack 80, win 94, options [nop,nop,TS val 1794904 ecr 1794904], length 0 77 16:37:49.792852 IP (tos 0x0, ttl 64, id 32480, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.34845: Flags [P.], cksum 0xfe38 (incorrect -> 0x4ae9), seq 2833437351:2833437367, ack 1981193718, win 98, options [nop,nop,TS val 130273 ecr 129636], length 16: OpenFlow version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000004f 78 16:37:49.796567 IP (tos 0x0, ttl 64, id 16409, offset 0, flags [DF], proto TCP (6), length 1124) 127.0.0.1.34845 > 127.0.0.1.6633: Flags [P.], cksum 0x0259 (incorrect -> 0x9472), seq 1:1073, ack 16, win 86, options [nop,nop,TS val 130274 ecr 130273], length 1072: OpenFlow version 1.3, type MULTIPART_REPLY, length 1072, xid 0x0000004f 79 16:37:49.796657 IP (tos 0x0, ttl 64, id 32481, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34845: Flags [.], cksum 0xfe28 (incorrect -> 0x48ae), ack 1073, win 103, options [nop,nop,TS val 130274 ecr 130274], length 0 80 17:10:39.694164 IP (tos 0x0, ttl 64, id 18557, offset 0, flags [DF], proto TCP (6), length 116) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc9ae), seq 1963343585:1963343649, ack 2145731315, win 105, options [nop,nop,TS val 622748 ecr 622308], length 64: OpenFlow version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000076 81 17:10:39.695936 IP (tos 0x0, ttl 64, id 19461, offset 0, flags [DF], proto TCP (6), length 236) 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfee0 (incorrect -> 0x89dd), seq 1:185, ack 64, win 86, options [nop,nop,TS val 622748 ecr 622748], length 184: OpenFlow version 1.3, type MULTIPART_REPLY, length 184, xid 0x00000076 82 17:10:39.696001 IP (tos 0x0, ttl 64, id 18558, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5d19), ack 185, win 109, options [nop,nop,TS val 622749 ecr 622748], length 0 83 17:10:39.706507 IP (tos 0x0, ttl 64, id 18559, offset 0, flags [DF], proto TCP (6), length 116) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe68 (incorrect -> 0xc6f5), seq 64:128, ack 185, win 109, options [nop,nop,TS val 622751 ecr 622748], length 64: OpenFlow version 1.3, type MULTIPART_REQUEST, length 64, xid 0x00000077 84 17:10:39.708491 IP (tos 0x0, ttl 64, id 19462, offset 0, flags [DF], proto TCP (6), length 92) 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe50 (incorrect -> 0x4e7c), seq 185:225, ack 128, win 86, options [nop,nop,TS val 622752 ecr 622751], length 40: OpenFlow version 1.3, type MULTIPART_REPLY, length 40, xid 0x00000077 85 17:10:39.747947 IP (tos 0x0, ttl 64, id 18560, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x5ca0), ack 225, win 109, options [nop,nop,TS val 622762 ecr 622752], length 0 86 17:20:21.268792 IP (tos 0x0, ttl 64, id 18795, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe38 (incorrect -> 0xdced), seq 1072:1088, ack 2705, win 256, options [nop,nop,TS val 768142 ecr 767309], length 16: OpenFlow version 1.3, type MULTIPART_REQUEST, length 16, xid 0x000000ed 87 17:20:21.270799 IP (tos 0x0, ttl 64, id 19580, offset 0, flags [DF], proto TCP (6), length 1604) 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0439 (incorrect -> 0xedc3), seq 2705:4257, ack 1088, win 86, options [nop,nop,TS val 768142 ecr 768142], length 1552: OpenFlow version 1.3, type MULTIPART_REPLY, length 1552, xid 0x000000ed 88 17:20:21.270887 IP (tos 0x0, ttl 64, id 18796, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xd8b8), ack 4257, win 254, options [nop,nop,TS val 768142 ecr 768142], length 0 89 17:21:32.610984 IP (tos 0x0, ttl 64, id 18829, offset 0, flags [DF], proto TCP (6), length 76) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0x48f2), seq 1248:1272, ack 4981, win 256, options [nop,nop,TS val 785977 ecr 784870], length 24: OpenFlow version 1.3, type MULTIPART_REQUEST, length 24, xid 0x000000ff 90 17:21:32.614400 IP (tos 0x0, ttl 64, id 19597, offset 0, flags [DF], proto TCP (6), length 628) 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0x0069 (incorrect -> 0x23f8), seq 4981:5557, ack 1272, win 86, options [nop,nop,TS val 785978 ecr 785977], length 576: OpenFlow version 1.3, type MULTIPART_REPLY, length 576, xid 0x000000ff 91 17:21:32.614511 IP (tos 0x0, ttl 64, id 18830, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x4793), ack 5557, win 255, options [nop,nop,TS val 785978 ecr 785978], length 0 92 17:21:32.932077 IP (tos 0x0, ttl 64, id 18831, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0x4228), seq 1272:1280, ack 5557, win 256, options [nop,nop,TS val 786058 ecr 785978], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x00000100 93 17:21:32.939513 IP (tos 0x0, ttl 64, id 19598, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x4278), seq 5557:5565, ack 1280, win 86, options [nop,nop,TS val 786059 ecr 786058], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x00000100 94 17:21:32.939617 IP (tos 0x0, ttl 64, id 18832, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0x46e0), ack 5565, win 256, options [nop,nop,TS val 786059 ecr 786059], length 0 95 17:27:12.201785 IP (tos 0x0, ttl 64, id 18969, offset 0, flags [DF], proto TCP (6), length 76) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe40 (incorrect -> 0xa9d9), seq 1840:1864, ack 6277, win 256, options [nop,nop,TS val 870875 ecr 869809], length 24: OpenFlow version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000147 96 17:27:12.204185 IP (tos 0x0, ttl 64, id 19667, offset 0, flags [DF], proto TCP (6), length 228) 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfed8 (incorrect -> 0xa1c3), seq 6277:6453, ack 1864, win 86, options [nop,nop,TS val 870876 ecr 870875], length 176: OpenFlow version 1.3, type MULTIPART_REPLY, length 176, xid 0x00000147 97 17:27:12.204269 IP (tos 0x0, ttl 64, id 18970, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xaa7b), ack 6453, win 256, options [nop,nop,TS val 870876 ecr 870876], length 0 98 17:27:12.931668 IP (tos 0x0, ttl 64, id 18971, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [P.], cksum 0xfe30 (incorrect -> 0xa464), seq 1864:1872, ack 6453, win 256, options [nop,nop,TS val 871057 ecr 870876], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x00000148 99 17:27:12.938585 IP (tos 0x0, ttl 64, id 19668, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.34887 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xa44e), seq 6453:6461, ack 1872, win 86, options [nop,nop,TS val 871059 ecr 871057], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x00000148 100 17:27:12.938697 IP (tos 0x0, ttl 64, id 18972, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34887: Flags [.], cksum 0xfe28 (incorrect -> 0xa8fd), ack 6461, win 256, options [nop,nop,TS val 871059 ecr 871059], length 0 101 17:57:16.110186 IP (tos 0x0, ttl 64, id 16966, offset 0, flags [DF], proto TCP (6), length 76) 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe40 (incorrect -> 0xcf7c), seq 555521909:555521933, ack 1543280532, win 105, options [nop,nop,TS val 1321852 ecr 1321585], length 24: OpenFlow version 1.3, type MULTIPART_REQUEST, length 24, xid 0x0000001f 102 17:57:16.113738 IP (tos 0x0, ttl 64, id 22868, offset 0, flags [DF], proto TCP (6), length 252) 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfef0 (incorrect -> 0x3421), seq 1:201, ack 24, win 86, options [nop,nop,TS val 1321853 ecr 1321852], length 200: OpenFlow version 1.3, type MULTIPART_REPLY, length 200, xid 0x0000001f 103 17:57:16.113974 IP (tos 0x0, ttl 64, id 16967, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xd1f7), ack 201, win 109, options [nop,nop,TS val 1321853 ecr 1321853], length 0 104 17:57:17.127188 IP (tos 0x0, ttl 64, id 16968, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xcc99), seq 24:40, ack 201, win 109, options [nop,nop,TS val 1322106 ecr 1321853], length 16: OpenFlow version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000020 105 17:57:17.129487 IP (tos 0x0, ttl 64, id 22869, offset 0, flags [DF], proto TCP (6), length 204) 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfec0 (incorrect -> 0xad66), seq 201:353, ack 40, win 86, options [nop,nop,TS val 1322107 ecr 1322106], length 152: OpenFlow version 1.3, type MULTIPART_REPLY, length 152, xid 0x00000020 106 17:57:17.130202 IP (tos 0x0, ttl 64, id 16969, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcf4f), ack 353, win 113, options [nop,nop,TS val 1322107 ecr 1322107], length 0 107 17:57:17.869382 IP (tos 0x0, ttl 64, id 16970, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.34888: Flags [P.], cksum 0xfe38 (incorrect -> 0xca33), seq 40:56, ack 353, win 113, options [nop,nop,TS val 1322292 ecr 1322107], length 16: OpenFlow version 1.3, type MULTIPART_REQUEST, length 16, xid 0x00000021 108 17:57:17.871408 IP (tos 0x0, ttl 64, id 22870, offset 0, flags [DF], proto TCP (6), length 108) 127.0.0.1.34888 > 127.0.0.1.6633: Flags [P.], cksum 0xfe60 (incorrect -> 0xc5b3), seq 353:409, ack 56, win 86, options [nop,nop,TS val 1322292 ecr 1322292], length 56: OpenFlow version 1.3, type MULTIPART_REPLY, length 56, xid 0x00000021 109 17:57:17.871493 IP (tos 0x0, ttl 64, id 16971, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.34888: Flags [.], cksum 0xfe28 (incorrect -> 0xcd95), ack 409, win 113, options [nop,nop,TS val 1322292 ecr 1322292], length 0 110 10:02:19.814878 IP (tos 0x0, ttl 64, id 47069, offset 0, flags [DF], proto TCP (6), length 76) 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x07aa), seq 260443467:260443491, ack 382342041, win 100, options [nop,nop,TS val 344035 ecr 343141], length 24: OpenFlow version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000028 111 10:02:19.815701 IP (tos 0x0, ttl 64, id 47114, offset 0, flags [DF], proto TCP (6), length 196) 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfeb8 (incorrect -> 0x3ff1), seq 1:145, ack 24, win 88, options [nop,nop,TS val 344035 ecr 344035], length 144: OpenFlow version 1.3, type MULTIPART_REPLY, length 144, xid 0x00000028 112 10:02:19.815724 IP (tos 0x0, ttl 64, id 47070, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x07fa), ack 145, win 105, options [nop,nop,TS val 344035 ecr 344035], length 0 113 10:02:20.713618 IP (tos 0x0, ttl 64, id 47071, offset 0, flags [DF], proto TCP (6), length 76) 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe40 (incorrect -> 0x029c), seq 24:48, ack 145, win 105, options [nop,nop,TS val 344260 ecr 344035], length 24: OpenFlow version 1.3, type MULTIPART_REQUEST, length 24, xid 0x00000029 114 10:02:20.714133 IP (tos 0x0, ttl 64, id 47115, offset 0, flags [DF], proto TCP (6), length 132) 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0xfe54), seq 145:225, ack 48, win 88, options [nop,nop,TS val 344260 ecr 344260], length 80: OpenFlow version 1.3, type MULTIPART_REPLY, length 80, xid 0x00000029 115 10:02:20.714160 IP (tos 0x0, ttl 64, id 47072, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x05d0), ack 225, win 105, options [nop,nop,TS val 344260 ecr 344260], length 0 116 10:02:21.229978 IP (tos 0x0, ttl 64, id 47073, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe30 (incorrect -> 0x010b), seq 48:56, ack 225, win 105, options [nop,nop,TS val 344389 ecr 344260], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x0000002a 117 10:02:21.231013 IP (tos 0x0, ttl 64, id 47116, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x0092), seq 225:233, ack 56, win 88, options [nop,nop,TS val 344389 ecr 344389], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x0000002a 118 10:02:21.231044 IP (tos 0x0, ttl 64, id 47074, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x04be), ack 233, win 105, options [nop,nop,TS val 344389 ecr 344389], length 0 119 10:02:21.852874 IP (tos 0x0, ttl 64, id 47075, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.36546: Flags [P.], cksum 0xfe38 (incorrect -> 0xffb1), seq 56:72, ack 233, win 105, options [nop,nop,TS val 344545 ecr 344389], length 16: OpenFlow version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000002b 120 10:02:21.853489 IP (tos 0x0, ttl 64, id 47117, offset 0, flags [DF], proto TCP (6), length 84) 127.0.0.1.36546 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xeddf), seq 233:265, ack 72, win 88, options [nop,nop,TS val 344545 ecr 344545], length 32: OpenFlow version 1.3, type MULTIPART_REPLY, length 32, xid 0x0000002b 121 10:02:21.853515 IP (tos 0x0, ttl 64, id 47076, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36546: Flags [.], cksum 0xfe28 (incorrect -> 0x0356), ack 265, win 105, options [nop,nop,TS val 344545 ecr 344545], length 0 122 10:30:09.945368 IP (tos 0x0, ttl 64, id 54874, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe30 (incorrect -> 0x68f4), seq 3359330522:3359330530, ack 3471458557, win 256, options [nop,nop,TS val 761568 ecr 760318], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x0000000d 123 10:30:09.946140 IP (tos 0x0, ttl 64, id 56416, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x64b3), seq 1:9, ack 8, win 86, options [nop,nop,TS val 761568 ecr 761568], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x0000000d 124 10:30:09.946173 IP (tos 0x0, ttl 64, id 54875, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x6829), ack 9, win 256, options [nop,nop,TS val 761568 ecr 761568], length 0 125 10:30:10.672306 IP (tos 0x0, ttl 64, id 54876, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.36547: Flags [P.], cksum 0xfe38 (incorrect -> 0x6320), seq 8:24, ack 9, win 256, options [nop,nop,TS val 761749 ecr 761568], length 16: OpenFlow version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000e 126 10:30:10.673261 IP (tos 0x0, ttl 64, id 56417, offset 0, flags [DF], proto TCP (6), length 11844) 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x30af), seq 9:11801, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761749], length 11792: OpenFlow version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e 127 10:30:10.673292 IP (tos 0x0, ttl 64, id 54877, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x38a9), ack 11801, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0 128 10:30:10.675065 IP (tos 0x0, ttl 64, id 56418, offset 0, flags [DF], proto TCP (6), length 11844) 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xc66e), seq 11801:23593, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e 129 10:30:10.675124 IP (tos 0x0, ttl 64, id 54878, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x0a99), ack 23593, win 244, options [nop,nop,TS val 761750 ecr 761750], length 0 130 10:30:10.675159 IP (tos 0x0, ttl 64, id 56419, offset 0, flags [DF], proto TCP (6), length 11844) 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x62e9), seq 23593:35385, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e 131 10:30:10.675174 IP (tos 0x0, ttl 64, id 54879, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xdc94), ack 35385, win 232, options [nop,nop,TS val 761750 ecr 761750], length 0 132 10:30:10.675194 IP (tos 0x0, ttl 64, id 56420, offset 0, flags [DF], proto TCP (6), length 11844) 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0xeed4), seq 35385:47177, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e 133 10:30:10.675206 IP (tos 0x0, ttl 64, id 54880, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xae91), ack 47177, win 219, options [nop,nop,TS val 761750 ecr 761750], length 0 134 10:30:10.675226 IP (tos 0x0, ttl 64, id 56421, offset 0, flags [DF], proto TCP (6), length 11844) 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x7ac0), seq 47177:58969, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e 135 10:30:10.675238 IP (tos 0x0, ttl 64, id 54881, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x808d), ack 58969, win 207, options [nop,nop,TS val 761750 ecr 761750], length 0 136 10:30:10.675257 IP (tos 0x0, ttl 64, id 56422, offset 0, flags [DF], proto TCP (6), length 11844) 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x04c0), seq 58969:70761, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e 137 10:30:10.675294 IP (tos 0x0, ttl 64, id 56423, offset 0, flags [DF], proto TCP (6), length 11844) 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x90ab), seq 70761:82553, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e 138 10:30:10.675314 IP (tos 0x0, ttl 64, id 56424, offset 0, flags [DF], proto TCP (6), length 11844) 127.0.0.1.36547 > 127.0.0.1.6633: Flags [P.], cksum 0x2c39 (incorrect -> 0x1c98), seq 82553:94345, ack 24, win 86, options [nop,nop,TS val 761750 ecr 761750], length 11792: OpenFlow version 1.3, type MULTIPART_REPLY, length 11792, xid 0x0000000e 139 10:30:10.675325 IP (tos 0x0, ttl 64, id 54882, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0x2486), ack 82553, win 182, options [nop,nop,TS val 761750 ecr 761750], length 0 140 10:30:10.712539 IP (tos 0x0, ttl 64, id 54883, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36547: Flags [.], cksum 0xfe28 (incorrect -> 0xf621), ack 94345, win 256, options [nop,nop,TS val 761760 ecr 761750], length 0 141 10:46:50.838754 IP (tos 0x0, ttl 64, id 46973, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.36548: Flags [P.], cksum 0xfe38 (incorrect -> 0x2338), seq 75556183:75556199, ack 3751019041, win 98, options [nop,nop,TS val 1011791 ecr 1010724], length 16: OpenFlow version 1.3, type MULTIPART_REQUEST, length 16, xid 0x0000000d 142 10:46:50.839431 IP (tos 0x0, ttl 64, id 43209, offset 0, flags [DF], proto TCP (6), length 388) 127.0.0.1.36548 > 127.0.0.1.6633: Flags [P.], cksum 0xff78 (incorrect -> 0x0f3d), seq 1:337, ack 16, win 86, options [nop,nop,TS val 1011791 ecr 1011791], length 336: OpenFlow version 1.3, type MULTIPART_REPLY, length 336, xid 0x0000000d 143 10:46:50.839471 IP (tos 0x0, ttl 64, id 46974, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.36548: Flags [.], cksum 0xfe28 (incorrect -> 0x21fc), ack 337, win 103, options [nop,nop,TS val 1011791 ecr 1011791], length 0 144 19:45:16.495434 IP (tos 0x0, ttl 64, id 17712, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0xe6e3), seq 1323837391:1323837399, ack 1278624979, win 94, options [nop,nop,TS val 6181422 ecr 6180173], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x0000006d 145 19:45:16.496030 IP (tos 0x0, ttl 64, id 23686, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xe200), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6181423 ecr 6181422], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x0000006d 146 19:45:16.496057 IP (tos 0x0, ttl 64, id 17713, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0xe677), ack 9, win 94, options [nop,nop,TS val 6181423 ecr 6181423], length 0 147 19:45:17.176752 IP (tos 0x0, ttl 64, id 17714, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe38 (incorrect -> 0xe026), seq 8:24, ack 9, win 94, options [nop,nop,TS val 6181593 ecr 6181423], length 16: OpenFlow version 1.3, type TABLE_MOD, length 16, xid 0x0000006e table_id 1, config 0x00000000 148 19:45:17.215970 IP (tos 0x0, ttl 64, id 23687, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.51984 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xe511), ack 24, win 86, options [nop,nop,TS val 6181603 ecr 6181593], length 0 149 19:53:23.472776 IP (tos 0x0, ttl 64, id 17917, offset 0, flags [DF], proto TCP (6), length 92) 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe50 (incorrect -> 0xb18a), seq 936:976, ack 1361, win 98, options [nop,nop,TS val 6303167 ecr 6302673], length 40: OpenFlow version 1.3, type PORT_MOD, length 40, xid 0x000000d4 port_no 1, hw_addr 0a:ea:83:10:db:09 config 0x00000040 (NO_PACKET_IN) mask 0x00000040 (NO_PACKET_IN) advertise 0x0000080a (10MB_FD, 100MB_FD, COPPER) 150 19:53:23.473744 IP (tos 0x0, ttl 64, id 23790, offset 0, flags [DF], proto TCP (6), length 132) 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x92a0), seq 1361:1441, ack 976, win 86, options [nop,nop,TS val 6303167 ecr 6303167], length 80: OpenFlow version 1.3, type PORT_STATUS, length 80, xid 0x00000000 reason MODIFY port_no 1, hw_addr 0a:ea:83:10:db:09, name 'veth0' 151 19:53:23.473777 IP (tos 0x0, ttl 64, id 17918, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x25f0), ack 1441, win 98, options [nop,nop,TS val 6303167 ecr 6303167], length 0 152 19:55:19.511983 IP (tos 0x0, ttl 64, id 17967, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.51984: Flags [P.], cksum 0xfe30 (incorrect -> 0x3fa5), seq 1168:1176, ack 1633, win 98, options [nop,nop,TS val 6332177 ecr 6331422], length 8: OpenFlow version 1.3, type BARRIER_REQUEST, length 8, xid 0x000000ed 153 19:55:19.513048 IP (tos 0x0, ttl 64, id 23815, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.51984 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x3cb5), seq 1633:1641, ack 1176, win 86, options [nop,nop,TS val 6332177 ecr 6332177], length 8: OpenFlow version 1.3, type BARRIER_REPLY, length 8, xid 0x000000ed 154 19:55:19.513081 IP (tos 0x0, ttl 64, id 17968, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.51984: Flags [.], cksum 0xfe28 (incorrect -> 0x41bb), ack 1641, win 98, options [nop,nop,TS val 6332177 ecr 6332177], length 0 155 20:10:12.609713 IP (tos 0x0, ttl 64, id 45627, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0x8da8), seq 2129684753:2129684761, ack 2572383599, win 96, options [nop,nop,TS val 6555451 ecr 6554199], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x0000007d 156 20:10:12.610357 IP (tos 0x0, ttl 64, id 49206, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0x88c5), seq 1:9, ack 8, win 86, options [nop,nop,TS val 6555451 ecr 6555451], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x0000007d 157 20:10:12.610382 IP (tos 0x0, ttl 64, id 45628, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8d4b), ack 9, win 96, options [nop,nop,TS val 6555451 ecr 6555451], length 0 158 20:10:13.364783 IP (tos 0x0, ttl 64, id 45629, offset 0, flags [DF], proto TCP (6), length 68) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe38 (incorrect -> 0x87d1), seq 8:24, ack 9, win 96, options [nop,nop,TS val 6555640 ecr 6555451], length 16: OpenFlow version 1.3, type QUEUE_GET_CONFIG_REQUEST, length 16, xid 0x0000007e port 1 159 20:10:13.366754 IP (tos 0x0, ttl 64, id 49207, offset 0, flags [DF], proto TCP (6), length 132) 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe78 (incorrect -> 0x80dc), seq 9:89, ack 24, win 86, options [nop,nop,TS val 6555640 ecr 6555640], length 80: OpenFlow version 1.3, type QUEUE_GET_CONFIG_REPLY, length 80, xid 0x0000007e 160 20:10:13.366788 IP (tos 0x0, ttl 64, id 45630, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0x8b71), ack 89, win 96, options [nop,nop,TS val 6555640 ecr 6555640], length 0 161 20:24:40.574081 IP (tos 0x0, ttl 64, id 45979, offset 0, flags [DF], proto TCP (6), length 76) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe40 (incorrect -> 0xba52), seq 1432:1456, ack 1497, win 96, options [nop,nop,TS val 6772442 ecr 6771701], length 24: OpenFlow version 1.3, type ROLE_REQUEST, length 24, xid 0x0000012f role MASTER, generation_id 0x00000000012e248a 162 20:24:40.574726 IP (tos 0x0, ttl 64, id 49382, offset 0, flags [DF], proto TCP (6), length 76) 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe40 (incorrect -> 0xb75e), seq 1497:1521, ack 1456, win 86, options [nop,nop,TS val 6772442 ecr 6772442], length 24: OpenFlow version 1.3, type ROLE_REPLY, length 24, xid 0x0000012f role MASTER, generation_id 0x00000000012e248a 163 20:24:40.574748 IP (tos 0x0, ttl 64, id 45980, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xe276), ack 1521, win 96, options [nop,nop,TS val 6772442 ecr 6772442], length 0 164 20:28:52.608224 IP (tos 0x0, ttl 64, id 46086, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xf205), seq 1904:1912, ack 1985, win 96, options [nop,nop,TS val 6835451 ecr 6834201], length 8: OpenFlow version 1.3, type ECHO_REQUEST, length 8, xid 0x00000165 165 20:28:52.609219 IP (tos 0x0, ttl 64, id 49437, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe30 (incorrect -> 0xed24), seq 1985:1993, ack 1912, win 86, options [nop,nop,TS val 6835451 ecr 6835451], length 8: OpenFlow version 1.3, type ECHO_REPLY, length 8, xid 0x00000165 166 20:28:52.609246 IP (tos 0x0, ttl 64, id 46087, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xf292), ack 1993, win 96, options [nop,nop,TS val 6835451 ecr 6835451], length 0 167 20:28:54.103683 IP (tos 0x0, ttl 64, id 46088, offset 0, flags [DF], proto TCP (6), length 84) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe48 (incorrect -> 0xeb3a), seq 1912:1944, ack 1993, win 96, options [nop,nop,TS val 6835824 ecr 6835451], length 32: OpenFlow version 1.3, type SET_ASYNC, length 32, xid 0x00000166 packet_in_mask[EM] 0x00000003 (NO_MATCH, ACTION) packet_in_mask[S] 0x00000002 (ACTION) port_status_mask[EM] 0x00000007 (ADD, DELETE, MODIFY) port_status_mask[S] 0x00000002 (DELETE) flow_removed_mask[EM] 0x00000007 (ADD, DELETE, MODIFY) flow_removed_mask[S] 0x00000004 (MODIFY) 168 20:28:54.140673 IP (tos 0x0, ttl 64, id 49438, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xef88), ack 1944, win 86, options [nop,nop,TS val 6835834 ecr 6835824], length 0 169 20:28:56.308694 IP (tos 0x0, ttl 64, id 46089, offset 0, flags [DF], proto TCP (6), length 60) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [P.], cksum 0xfe30 (incorrect -> 0xe7bd), seq 1944:1952, ack 1993, win 96, options [nop,nop,TS val 6836376 ecr 6835834], length 8: OpenFlow version 1.3, type GET_ASYNC_REQUEST, length 8, xid 0x00000167 170 20:28:56.308754 IP (tos 0x0, ttl 64, id 49439, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.51987 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0xeb3a), ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 0 171 20:28:56.309209 IP (tos 0x0, ttl 64, id 49440, offset 0, flags [DF], proto TCP (6), length 84) 127.0.0.1.51987 > 127.0.0.1.6633: Flags [P.], cksum 0xfe48 (incorrect -> 0xe557), seq 1993:2025, ack 1952, win 86, options [nop,nop,TS val 6836376 ecr 6836376], length 32: OpenFlow version 1.3, type GET_ASYNC_REPLY, length 32, xid 0x00000167 packet_in_mask[EM] 0x00000003 (NO_MATCH, ACTION) packet_in_mask[S] 0x00000002 (ACTION) port_status_mask[EM] 0x00000007 (ADD, DELETE, MODIFY) port_status_mask[S] 0x00000002 (DELETE) flow_removed_mask[EM] 0x00000007 (ADD, DELETE, MODIFY) flow_removed_mask[S] 0x00000004 (MODIFY) 172 20:28:56.309230 IP (tos 0x0, ttl 64, id 46090, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.6633 > 127.0.0.1.51987: Flags [.], cksum 0xfe28 (incorrect -> 0xeb10), ack 2025, win 96, options [nop,nop,TS val 6836376 ecr 6836376], length 0 173 20:37:22.358712 IP (tos 0x0, ttl 64, id 18246, offset 0, flags [DF], proto TCP (6), length 100) 127.0.0.1.6633 > 127.0.0.1.51989: Flags [P.], cksum 0xfe58 (incorrect -> 0x9b52), seq 1436436734:1436436782, ack 2087738396, win 96, options [nop,nop,TS val 6962888 ecr 6961981], length 48: OpenFlow version 1.3, type METER_MOD, length 48, xid 0x00000010 174 20:37:22.396699 IP (tos 0x0, ttl 64, id 23571, offset 0, flags [DF], proto TCP (6), length 52) 127.0.0.1.51989 > 127.0.0.1.6633: Flags [.], cksum 0xfe28 (incorrect -> 0x9d9e), ack 48, win 86, options [nop,nop,TS val 6962898 ecr 6962888], length 0 @ 1.1.1.1 log @Import tcpdump-4.99.4 (last was 4.9.3) Friday, April 7, 2023 / The Tcpdump Group Summary for 4.99.4 tcpdump release Source code: Fix spaces before tabs in indentation. Updated printers: LSP ping: Fix "Unused value" warnings from Coverity. CVE-2023-1801: Fix an out-of-bounds write in the SMB printer. DNS: sync resource types with IANA. ICMPv6: Update the output to show a RPL DAO field name. Geneve: Fix the Geneve UDP port test. Building and testing: Require at least autoconf 2.69. Don't check for strftime(), as it's in C90 and beyond. Update config.{guess,sub}, timestamps 2023-01-01,2023-01-21. Documentation: man: Document TCP flag names better. Thursday, January 12, 2023 / The Tcpdump Group Summary for 4.99.3 tcpdump release Updated printers: PTP: Use the proper values for the control field and print un-allocated values for the message field as "Reserved" instead of "none". Source code: smbutil.c: Replace obsolete function call (asctime) Building and testing: cmake: Update the minimum required version to 2.8.12 (except Windows). CI: Introduce and use TCPDUMP_CMAKE_TAINTED. Makefile.in: Add the releasecheck target. Makefile.in: Add "make -s install" in the releasecheck target. Cirrus CI: Run the "make releasecheck" command in the Linux task. Makefile.in: Add the whitespacecheck target. Cirrus CI: Run the "make whitespacecheck" command in the Linux task. Address all shellcheck warnings in update-test.sh. Makefile.in: Get rid of a remain of gnuc.h. Documentation: Reformat the installation notes (INSTALL.txt) in Markdown. Convert CONTRIBUTING to Markdown. CONTRIBUTING.md: Document the use of "protocol: " in a commit summary. Add a README file for NetBSD. Fix CMake build to set man page section numbers in tcpdump.1 Saturday, December 31, 2022 / The Tcpdump Group Summary for 4.99.2 tcpdump release Updated printers: BGP: Update cease notification decoding to RFC 9003. BGP: decode BGP link-bandwidth extended community properly. BGP: Fix parsing the AIGP attribute BGP: make sure the path attributes don't go past the end of the packet. BGP: Shutdown message can be up to 255 bytes length according to rfc9003 DSA: correctly determine VID. EAP: fix some length checks and output issues. 802.11: Fix the misleading comment regarding "From DS", "To DS" Frame Control Flags. 802.11: Fetch the CF and TIM IEs a field at a time. 802.15.4, BGP, LISP: fix some length checks, compiler warnings, and undefined behavior warnings. PFLOG: handle LINKTYPE_PFLOG/DLT_PFLOG files from all OSes on all OSes. RRCP: support more Realtek protocols than just RRCP. MPLS: show the EXP field as TC, as per RFC 5462. ICMP: redo MPLS Extension code as general ICMP Extension code. VQP: Do not print unknown error codes twice. Juniper: Add some bounds checks. Juniper: Don't treat known DLT_ types as "Unknown". lwres: Fix a length check, update a variable type. EAP: Fix some undefined behaviors at runtime. Ethernet: Rework the length checks, add a length check. IPX: Add two length checks. Zephyr: Avoid printing non-ASCII characters. VRRP: Print the protocol name before any GET_(). DCCP: Get rid of trailing commas in lists. Juniper: Report invalid packets as invalid, not truncated. IPv6: Remove an obsolete code in an always-false #if wrapper. ISAKMP: Use GET_U_1() to replace a direct dereference. RADIUS: Use GET_U_1() to replace a direct dereference. TCP: Fix an invalid check. RESP: Fix an invalid check. RESP: Remove an unnecessary test. Arista: Refine the output format and print HwInfo. sFlow: add support for IPv6 agent, add a length check. VRRP: add support for IPv6. OSPF: Update to match the Router Properties registry. OSPF: Remove two unnecessary dereferences. OSPF: Add support bit Nt RFC3101. OSPFv3: Remove two unnecessary dereferences. ICMPv6: Fix output for Router Renumbering messages. ICMPv6: Fix the Node Information flags. ICMPv6: Remove an unused macro and extra blank lines. ICMPv6: Add a length check in the rpl_dio_print() function. ICMPv6: Use GET_IP6ADDR_STRING() in the rpl_dio_print() function. IPv6: Add some checks for the Hop-by-Hop Options header IPv6: Add a check for the Jumbo Payload Hop-by-Hop option. NFS: Fix the format for printing an unsigned int PTP: fix printing of the correction fields PTP: Use ND_LCHECK_U for checking invalid length. WHOIS: Add its own printer source file and printer function MPTCP: print length before subtype inside MPTCP options ESP: Add a workaround to a "use-of-uninitialized-value". PPP: Add tests to avoid incorrectly re-entering ppp_hdlc(). PPP: Don't process further if protocol is unknown (-e option). PPP: Change the pointer to packet data. ZEP: Add three length checks. Add some const qualifiers. Building and testing: Update config.guess and config.sub. Use AS_HELP_STRING macro instead of AC_HELP_STRING. Handle some Autoconf/make errors better. Fix an error when cross-compiling. Use "git archive" for the "make releasetar" process. Remove the release candidate rcX targets. Mend "make check" on Solaris 9 with Autoconf. Address assorted compiler warnings. Fix auto-enabling of Capsicum on FreeBSD with Autoconf. Treat "msys" as Windows for test exit statuses. Clean up some help messages in configure. Use unified diff by default. Remove awk code from mkdep. Fix configure test errors with Clang 15 CMake: Prevent stripping of the RPATH on installation. AppVeyor CI: update Npcap site, update to 1.12 SDK. Cirrus CI: Use the same configuration as for the main branch. CI: Add back running tcpdump -J/-L and capture, now with Cirrus VMs. Remove four test files (They are now in the libpcap tests directory). On Solaris, for 64-bit builds, use the 64-bit pcap-config. Tell CMake not to check for a C++ compiler. CMake: Add a way to request -Werror and equivalents. configure: Special-case macOS /usr/bin/pcap-config as we do in CMake. configure: Use pcap-config --static-pcap-only if available. configure: Use ac_c_werror_flag to force unknown compiler flags to fail. configure: Use AC_COMPILE_IFELSE() and AC_LANG_SOURCE() for testing flags. Run the test that fails on OpenBSD only if we're not on OpenBSD. Source code: Fix some snapend-changing routines to protect against pointer underflow. Use __func__ from C99 in some function calls. Memory allocator: Update nd_add_alloc_list() to a static function. addrtoname.c: Fix two invalid tests. Use more S_SUCCESS and S_ERR_HOST_PROGRAM in main(). Add some comments about "don't use GET_IP6ADDR_STRING()". Assign ndo->ndo_packetp in pretty_print_packet(). Add ND_LCHECKMSG_U, ND_LCHECK_U, ND_LCHECKMSG_ZU and ND_LCHECK_ZU macros. Update tok2strbuf() to a static function. netdissect.h: Keep the link-layer dissectors names sorted. setsignal(): Set SA_RESTART on non-lethal signals (REQ_INFO, FLUSH_PCAP) to avoid corrupting binary pcap output. Use __builtin_unreachable(). Fail if nd_push_buffer() or nd_push_snaplen() fails. Improve code style and fix many typos. Documentation: Some man page cleanups. Update the print interface for the packet count to stdout. Note that we require compilers to support at least some of C99. Update AIX and Solaris-related specifics. INSTALL.txt: Add doc/README.*, delete the deleted win32 directory. Update README.md and README.Win32.md. Update some comments with new RFC numbers. Wednesday, June 9, 2021 by gharris Summary for 4.99.1 tcpdump release Source code: Squelch some compiler warnings ICMP: Update the snapend for some nested IP packets. MACsec: Update the snapend thus the ICV field is not payload for the caller. EIGRP: Fix packet header fields SMB: Disable printer by default in CMake builds OLSR: Print the protocol name even if the packet is invalid MSDP: Print ": " before the protocol name ESP: Remove padding, padding length and next header from the buffer DHCPv6: Update the snapend for nested DHCPv6 packets OpenFlow 1.0: Get snapend right for nested frames. TCP: Update the snapend before decoding a MPTCP option Ethernet, IEEE 802.15.4, IP, L2TP, TCP, ZEP: Add bounds checks ForCES: Refine SPARSEDATA-TLV length check. ASCII/hex: Use nd_trunc_longjmp() in truncation cases GeoNet: Add a ND_TCHECK_LEN() call Replace ND_TCHECK_/memcpy() pairs with GET_CPY_BYTES(). BGP: Fix overwrites of global 'astostr' temporary buffer ARP: fix overwrites of static buffer in q922_string(). Frame Relay: have q922_string() handle errors better. Building and testing: Rebuild configure script when building release Fix "make clean" for out-of-tree autotools builds CMake: add stuff from CMAKE_PREFIX_PATH to PKG_CONFIG_PATH. Documentation: man: Update a reference as www.cifs.org is gone. [skip ci] man: Update DNS sections Solaris: Fix a compile error with Sun C Wednesday, December 30, 2020, by mcr@@sandelman.ca, denis and fxl. Summary for 4.99.0 tcpdump release CVE-2018-16301: For the -F option handle large input files safely. Improve the contents, wording and formatting of the man page. Print unsupported link-layer protocol packets in hex. Add support for new network protocols and DLTs: Arista, Autosar SOME/IP, Broadcom LI and Ethernet switches tag, IEEE 802.15.9, IP-over-InfiniBand (IPoIB), Linux SLL2, Linux vsockmon, MACsec, Marvell Distributed Switch Architecture, OpenFlow 1.3, Precision Time Protocol (PTP), SSH, WHOIS, ZigBee Encapsulation Protocol (ZEP). Make protocol-specific updates for: AH, DHCP, DNS, ESP, FRF.16, HNCP, ICMP6, IEEE 802.15.4, IPv6, IS-IS, Linux SLL, LLDP, LSP ping, MPTCP, NFS, NSH, NTP, OSPF, OSPF6, PGM, PIM, PPTP, RADIUS, RSVP, Rx, SMB, UDLD, VXLAN-GPE. User interface: Make SLL2 the default for Linux "any" pseudo-device. Add --micro and --nano shorthands. Add --count to print a counter only instead of decoding. Add --print, to cause packet printing even with -w. Add support for remote capture if libpcap supports it. Display the "wireless" flag and connection status. Flush the output packet buffer on a SIGUSR2. Add the snapshot length to the "reading from file ..." message. Fix local time printing (DST offset in timestamps). Allow -C arguments > 2^31-1 GB if they can fit into a long. Handle very large -f files by rejecting them. Report periodic stats only when safe to do so. Print the number of packets captured only as often as necessary. With no -s, or with -s 0, don't specify the snapshot length with newer versions of libpcap. Improve version and usage message printing. Building and testing: Install into bindir, not sbindir. autoconf: replace --with-system-libpcap with --disable-local-libpcap. Require the compiler to support C99. Better detect and use various C compilers and their features. Add CMake as the second build system. Make out-of-tree builds more reliable. Use pkg-config to detect libpcap if available. Improve Windows support. Add more tests and improve the scripts that run them. Test both with "normal" and "x87" floating-point. Eliminate dependency on libdnet. FreeBSD: Print a proper error message about monitor mode VAP. Use libcasper if available. Fix failure to capture on RDMA device. Include the correct capsicum header. Source code: Start the transition to longjmp() for packet truncation handling. Introduce new helper functions, including GET_*(), nd_print_protocol(), nd_print_invalid(), nd_print_trunc(), nd_trunc_longjmp() and others. Put integer signedness right in many cases. Introduce nd_uint*, nd_mac_addr, nd_ipv4 and nd_ipv6 types to fix alignment issues, especially on SPARC. Fix many C compiler, Coverity, UBSan and cppcheck warnings. Fix issues detected with AddressSanitizer. Remove many workarounds for older compilers and OSes. Add a sanity check on packet header length. Add and remove plenty of bounds checks. Clean up pcap_findalldevs() call to find the first interface. Use a short timeout, rather than immediate mode, for text output. Handle DLT_ENC files *not* written on the same OS and byte-order host. Add, and use, macros to do locale-independent case mapping. Use a table instead of getprotobynumber(). Get rid of ND_UNALIGNED and ND_TCHECK(). Make roundup2() generally available. Resync SMI list against Wireshark. Fix many typos. @ text @@ 1.1.1.1.2.1 log @Sync with HEAD @ text @d1 1 a1 1 1 2013-10-19 15:52:49.322823 IP (tos 0x0, ttl 64, id 348, offset 0, flags [DF], proto TCP (6), length 236) d4 1 a4 1 2 2013-10-19 15:52:49.362355 IP (tos 0x0, ttl 64, id 61731, offset 0, flags [DF], proto TCP (6), length 52) d6 1 a6 1 3 2013-10-19 15:52:49.367093 IP (tos 0x0, ttl 64, id 349, offset 0, flags [DF], proto TCP (6), length 60) d9 1 a9 1 4 2013-10-19 15:52:49.367137 IP (tos 0x0, ttl 64, id 61732, offset 0, flags [DF], proto TCP (6), length 52) d11 1 a11 1 5 2013-10-19 15:52:49.367403 IP (tos 0x0, ttl 64, id 61733, offset 0, flags [DF], proto TCP (6), length 60) d14 1 a14 1 6 2013-10-19 15:52:49.367421 IP (tos 0x0, ttl 64, id 350, offset 0, flags [DF], proto TCP (6), length 52) d16 1 a16 1 7 2013-10-20 12:15:37.979676 IP (tos 0x0, ttl 64, id 46225, offset 0, flags [DF], proto TCP (6), length 420) d19 1 a19 1 8 2013-10-20 12:15:37.985455 IP (tos 0x0, ttl 64, id 55504, offset 0, flags [DF], proto TCP (6), length 432) d24 1 a24 1 9 2013-10-20 12:15:37.985482 IP (tos 0x0, ttl 64, id 46226, offset 0, flags [DF], proto TCP (6), length 52) d26 1 a26 1 10 2013-10-21 14:53:56.336558 IP (tos 0x0, ttl 64, id 63838, offset 0, flags [DF], proto TCP (6), length 172) d29 1 a29 1 11 2013-10-21 14:53:56.339805 IP (tos 0x0, ttl 64, id 30929, offset 0, flags [DF], proto TCP (6), length 184) d34 1 a34 1 12 2013-10-21 14:53:56.339839 IP (tos 0x0, ttl 64, id 63839, offset 0, flags [DF], proto TCP (6), length 52) d36 1 a36 1 13 2013-10-22 07:06:07.923021 IP (tos 0x0, ttl 64, id 53050, offset 0, flags [DF], proto TCP (6), length 60) d38 1 a38 1 14 2013-10-22 07:06:07.923406 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) d40 1 a40 1 15 2013-10-22 07:06:11.948050 IP (tos 0x0, ttl 64, id 25056, offset 0, flags [DF], proto TCP (6), length 60) d42 1 a42 1 16 2013-10-22 07:06:11.948123 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) d44 1 a44 1 17 2013-10-22 07:06:11.948171 IP (tos 0x0, ttl 64, id 25057, offset 0, flags [DF], proto TCP (6), length 52) d46 1 a46 1 18 2013-10-22 07:06:11.948588 IP (tos 0x0, ttl 64, id 25058, offset 0, flags [DF], proto TCP (6), length 60) d49 1 a49 1 19 2013-10-22 07:06:11.948646 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 52) d51 1 a51 1 20 2013-10-22 07:06:11.951581 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 60) d54 1 a54 1 21 2013-10-22 07:06:11.951654 IP (tos 0x0, ttl 64, id 25059, offset 0, flags [DF], proto TCP (6), length 52) d56 1 a56 1 22 2013-10-22 07:06:11.954851 IP (tos 0x0, ttl 64, id 25060, offset 0, flags [DF], proto TCP (6), length 150) d61 1 a61 1 23 2013-10-22 07:06:11.956875 IP (tos 0x0, ttl 64, id 25061, offset 0, flags [DF], proto TCP (6), length 52) d63 1 a63 1 24 2013-10-22 07:06:11.995263 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52) d65 1 a65 1 25 2013-10-22 07:06:11.996996 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60) d68 1 a68 1 26 2013-10-22 07:06:11.997117 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) d70 1 a70 1 27 2013-10-22 20:23:02.447284 IP (tos 0x0, ttl 64, id 5822, offset 0, flags [DF], proto TCP (6), length 60) d73 1 a73 1 28 2013-10-22 20:23:02.487886 IP (tos 0x0, ttl 64, id 541, offset 0, flags [DF], proto TCP (6), length 52) d75 1 a75 1 29 2013-10-22 20:23:03.289931 IP (tos 0x0, ttl 64, id 5823, offset 0, flags [DF], proto TCP (6), length 60) d78 1 a78 1 30 2013-10-22 20:23:03.290134 IP (tos 0x0, ttl 64, id 542, offset 0, flags [DF], proto TCP (6), length 52) d80 1 a80 1 31 2013-10-22 20:23:03.292620 IP (tos 0x0, ttl 64, id 543, offset 0, flags [DF], proto TCP (6), length 60) d83 1 a83 1 32 2013-10-22 20:23:03.292690 IP (tos 0x0, ttl 64, id 5824, offset 0, flags [DF], proto TCP (6), length 52) d85 1 a85 1 33 2013-10-22 20:23:03.674363 IP (tos 0x0, ttl 64, id 5825, offset 0, flags [DF], proto TCP (6), length 68) d89 1 a89 1 34 2013-10-22 20:23:03.711246 IP (tos 0x0, ttl 64, id 544, offset 0, flags [DF], proto TCP (6), length 52) d91 1 a91 1 35 2013-10-24 09:18:28.508689 IP (tos 0x0, ttl 64, id 8726, offset 0, flags [DF], proto TCP (6), length 60) d94 1 a94 1 36 2013-10-24 09:18:28.512206 IP (tos 0x0, ttl 64, id 48675, offset 0, flags [DF], proto TCP (6), length 60) d97 1 a97 1 37 2013-10-24 09:18:28.512310 IP (tos 0x0, ttl 64, id 8727, offset 0, flags [DF], proto TCP (6), length 52) d99 1 a99 1 38 2013-10-24 09:18:29.938866 IP (tos 0x0, ttl 64, id 8728, offset 0, flags [DF], proto TCP (6), length 73) d103 1 a103 1 39 2013-10-24 09:18:29.940525 IP (tos 0x0, ttl 64, id 48676, offset 0, flags [DF], proto TCP (6), length 73) d107 1 a107 1 40 2013-10-24 09:18:29.940621 IP (tos 0x0, ttl 64, id 8729, offset 0, flags [DF], proto TCP (6), length 52) d109 1 a109 1 41 2013-10-24 15:41:10.777155 IP (tos 0x0, ttl 64, id 14454, offset 0, flags [DF], proto TCP (6), length 68) d113 1 a113 1 42 2013-10-24 15:41:10.782182 IP (tos 0x0, ttl 64, id 51401, offset 0, flags [DF], proto TCP (6), length 80) d118 1 a118 1 43 2013-10-24 15:41:10.782279 IP (tos 0x0, ttl 64, id 14455, offset 0, flags [DF], proto TCP (6), length 52) d120 1 a120 1 44 2013-10-24 15:41:10.978145 IP (tos 0x0, ttl 64, id 14456, offset 0, flags [DF], proto TCP (6), length 60) d123 1 a123 1 45 2013-10-24 15:41:10.981725 IP (tos 0x0, ttl 64, id 51402, offset 0, flags [DF], proto TCP (6), length 60) d126 1 a126 1 46 2013-10-24 15:41:10.981828 IP (tos 0x0, ttl 64, id 14457, offset 0, flags [DF], proto TCP (6), length 52) d128 1 a128 1 47 2013-10-24 15:41:11.640555 IP (tos 0x0, ttl 64, id 14458, offset 0, flags [DF], proto TCP (6), length 85) d133 1 a133 1 48 2013-10-24 15:41:11.649632 IP (tos 0x0, ttl 64, id 51403, offset 0, flags [DF], proto TCP (6), length 97) d138 1 a138 1 49 2013-10-24 15:41:11.649721 IP (tos 0x0, ttl 64, id 14459, offset 0, flags [DF], proto TCP (6), length 52) d140 1 a140 1 50 2013-10-24 15:47:18.960105 IP (tos 0x0, ttl 64, id 14608, offset 0, flags [DF], proto TCP (6), length 60) d143 1 a143 1 51 2013-10-24 15:47:18.962238 IP (tos 0x0, ttl 64, id 51478, offset 0, flags [DF], proto TCP (6), length 84) d148 1 a148 1 52 2013-10-24 15:47:18.962333 IP (tos 0x0, ttl 64, id 14609, offset 0, flags [DF], proto TCP (6), length 52) d150 1 a150 1 53 2013-10-24 16:32:34.623939 IP (tos 0x0, ttl 64, id 44797, offset 0, flags [DF], proto TCP (6), length 60) d153 1 a153 1 54 2013-10-24 16:32:34.625658 IP (tos 0x0, ttl 64, id 3493, offset 0, flags [DF], proto TCP (6), length 60) d156 1 a156 1 55 2013-10-24 16:32:34.625750 IP (tos 0x0, ttl 64, id 44798, offset 0, flags [DF], proto TCP (6), length 52) d158 1 a158 1 56 2013-10-24 16:32:34.844806 IP (tos 0x0, ttl 64, id 44799, offset 0, flags [DF], proto TCP (6), length 64) d162 1 a162 1 57 2013-10-24 16:32:34.883698 IP (tos 0x0, ttl 64, id 3494, offset 0, flags [DF], proto TCP (6), length 52) d164 1 a164 1 58 2013-10-24 16:32:36.376083 IP (tos 0x0, ttl 64, id 44800, offset 0, flags [DF], proto TCP (6), length 60) d167 1 a167 1 59 2013-10-24 16:32:36.376174 IP (tos 0x0, ttl 64, id 3495, offset 0, flags [DF], proto TCP (6), length 52) d169 1 a169 1 60 2013-10-24 16:32:36.378403 IP (tos 0x0, ttl 64, id 3496, offset 0, flags [DF], proto TCP (6), length 64) d173 1 a173 1 61 2013-10-24 16:32:36.378465 IP (tos 0x0, ttl 64, id 44801, offset 0, flags [DF], proto TCP (6), length 52) d175 1 a175 1 62 2013-10-24 17:39:10.589931 IP (tos 0x0, ttl 64, id 28700, offset 0, flags [DF], proto TCP (6), length 60) d178 1 a178 1 63 2013-10-24 17:39:10.592125 IP (tos 0x0, ttl 64, id 24186, offset 0, flags [DF], proto TCP (6), length 60) d181 1 a181 1 64 2013-10-24 17:39:10.592223 IP (tos 0x0, ttl 64, id 28701, offset 0, flags [DF], proto TCP (6), length 52) d183 1 a183 1 65 2013-10-24 17:39:11.275605 IP (tos 0x0, ttl 64, id 28702, offset 0, flags [DF], proto TCP (6), length 152) d186 1 a186 1 66 2013-10-24 17:39:11.278453 IP (tos 0x0, ttl 64, id 24187, offset 0, flags [DF], proto TCP (6), length 206) d189 1 a189 1 67 2013-10-24 17:39:11.278747 IP (tos 0x0, ttl 64, id 28703, offset 0, flags [DF], proto TCP (6), length 52) d191 1 a191 1 68 2013-10-24 17:39:11.293620 IP (tos 0x0, ttl 64, id 28704, offset 0, flags [DF], proto TCP (6), length 152) d194 1 a194 1 69 2013-10-24 17:39:11.296836 IP (tos 0x0, ttl 64, id 24188, offset 0, flags [DF], proto TCP (6), length 234) d197 1 a197 1 70 2013-10-24 17:39:11.334896 IP (tos 0x0, ttl 64, id 28705, offset 0, flags [DF], proto TCP (6), length 52) d199 1 a199 1 71 2013-10-25 10:22:45.030583 IP (tos 0x0, ttl 64, id 10058, offset 0, flags [DF], proto TCP (6), length 148) d202 1 a202 1 72 2013-10-25 10:22:45.067011 IP (tos 0x0, ttl 64, id 11330, offset 0, flags [DF], proto TCP (6), length 52) d204 1 a204 1 73 2013-10-25 10:22:46.038093 IP (tos 0x0, ttl 64, id 11331, offset 0, flags [DF], proto TCP (6), length 116) d207 1 a207 1 74 2013-10-25 10:22:46.038127 IP (tos 0x0, ttl 64, id 10059, offset 0, flags [DF], proto TCP (6), length 52) d209 1 a209 1 75 2013-10-25 13:15:24.725748 IP (tos 0x0, ttl 64, id 51120, offset 0, flags [DF], proto TCP (6), length 132) d214 1 a214 1 76 2013-10-25 13:15:24.725788 IP (tos 0x0, ttl 64, id 64306, offset 0, flags [DF], proto TCP (6), length 52) d216 1 a216 1 77 2013-10-31 16:37:49.792852 IP (tos 0x0, ttl 64, id 32480, offset 0, flags [DF], proto TCP (6), length 68) d219 1 a219 1 78 2013-10-31 16:37:49.796567 IP (tos 0x0, ttl 64, id 16409, offset 0, flags [DF], proto TCP (6), length 1124) d222 1 a222 1 79 2013-10-31 16:37:49.796657 IP (tos 0x0, ttl 64, id 32481, offset 0, flags [DF], proto TCP (6), length 52) d224 1 a224 1 80 2013-10-31 17:10:39.694164 IP (tos 0x0, ttl 64, id 18557, offset 0, flags [DF], proto TCP (6), length 116) d227 1 a227 1 81 2013-10-31 17:10:39.695936 IP (tos 0x0, ttl 64, id 19461, offset 0, flags [DF], proto TCP (6), length 236) d230 1 a230 1 82 2013-10-31 17:10:39.696001 IP (tos 0x0, ttl 64, id 18558, offset 0, flags [DF], proto TCP (6), length 52) d232 1 a232 1 83 2013-10-31 17:10:39.706507 IP (tos 0x0, ttl 64, id 18559, offset 0, flags [DF], proto TCP (6), length 116) d235 1 a235 1 84 2013-10-31 17:10:39.708491 IP (tos 0x0, ttl 64, id 19462, offset 0, flags [DF], proto TCP (6), length 92) d238 1 a238 1 85 2013-10-31 17:10:39.747947 IP (tos 0x0, ttl 64, id 18560, offset 0, flags [DF], proto TCP (6), length 52) d240 1 a240 1 86 2013-10-31 17:20:21.268792 IP (tos 0x0, ttl 64, id 18795, offset 0, flags [DF], proto TCP (6), length 68) d243 1 a243 1 87 2013-10-31 17:20:21.270799 IP (tos 0x0, ttl 64, id 19580, offset 0, flags [DF], proto TCP (6), length 1604) d246 1 a246 1 88 2013-10-31 17:20:21.270887 IP (tos 0x0, ttl 64, id 18796, offset 0, flags [DF], proto TCP (6), length 52) d248 1 a248 1 89 2013-10-31 17:21:32.610984 IP (tos 0x0, ttl 64, id 18829, offset 0, flags [DF], proto TCP (6), length 76) d251 1 a251 1 90 2013-10-31 17:21:32.614400 IP (tos 0x0, ttl 64, id 19597, offset 0, flags [DF], proto TCP (6), length 628) d254 1 a254 1 91 2013-10-31 17:21:32.614511 IP (tos 0x0, ttl 64, id 18830, offset 0, flags [DF], proto TCP (6), length 52) d256 1 a256 1 92 2013-10-31 17:21:32.932077 IP (tos 0x0, ttl 64, id 18831, offset 0, flags [DF], proto TCP (6), length 60) d259 1 a259 1 93 2013-10-31 17:21:32.939513 IP (tos 0x0, ttl 64, id 19598, offset 0, flags [DF], proto TCP (6), length 60) d262 1 a262 1 94 2013-10-31 17:21:32.939617 IP (tos 0x0, ttl 64, id 18832, offset 0, flags [DF], proto TCP (6), length 52) d264 1 a264 1 95 2013-10-31 17:27:12.201785 IP (tos 0x0, ttl 64, id 18969, offset 0, flags [DF], proto TCP (6), length 76) d267 1 a267 1 96 2013-10-31 17:27:12.204185 IP (tos 0x0, ttl 64, id 19667, offset 0, flags [DF], proto TCP (6), length 228) d270 1 a270 1 97 2013-10-31 17:27:12.204269 IP (tos 0x0, ttl 64, id 18970, offset 0, flags [DF], proto TCP (6), length 52) d272 1 a272 1 98 2013-10-31 17:27:12.931668 IP (tos 0x0, ttl 64, id 18971, offset 0, flags [DF], proto TCP (6), length 60) d275 1 a275 1 99 2013-10-31 17:27:12.938585 IP (tos 0x0, ttl 64, id 19668, offset 0, flags [DF], proto TCP (6), length 60) d278 1 a278 1 100 2013-10-31 17:27:12.938697 IP (tos 0x0, ttl 64, id 18972, offset 0, flags [DF], proto TCP (6), length 52) d280 1 a280 1 101 2013-10-31 17:57:16.110186 IP (tos 0x0, ttl 64, id 16966, offset 0, flags [DF], proto TCP (6), length 76) d283 1 a283 1 102 2013-10-31 17:57:16.113738 IP (tos 0x0, ttl 64, id 22868, offset 0, flags [DF], proto TCP (6), length 252) d286 1 a286 1 103 2013-10-31 17:57:16.113974 IP (tos 0x0, ttl 64, id 16967, offset 0, flags [DF], proto TCP (6), length 52) d288 1 a288 1 104 2013-10-31 17:57:17.127188 IP (tos 0x0, ttl 64, id 16968, offset 0, flags [DF], proto TCP (6), length 68) d291 1 a291 1 105 2013-10-31 17:57:17.129487 IP (tos 0x0, ttl 64, id 22869, offset 0, flags [DF], proto TCP (6), length 204) d294 1 a294 1 106 2013-10-31 17:57:17.130202 IP (tos 0x0, ttl 64, id 16969, offset 0, flags [DF], proto TCP (6), length 52) d296 1 a296 1 107 2013-10-31 17:57:17.869382 IP (tos 0x0, ttl 64, id 16970, offset 0, flags [DF], proto TCP (6), length 68) d299 1 a299 1 108 2013-10-31 17:57:17.871408 IP (tos 0x0, ttl 64, id 22870, offset 0, flags [DF], proto TCP (6), length 108) d302 1 a302 1 109 2013-10-31 17:57:17.871493 IP (tos 0x0, ttl 64, id 16971, offset 0, flags [DF], proto TCP (6), length 52) d304 1 a304 1 110 2013-11-01 10:02:19.814878 IP (tos 0x0, ttl 64, id 47069, offset 0, flags [DF], proto TCP (6), length 76) d307 1 a307 1 111 2013-11-01 10:02:19.815701 IP (tos 0x0, ttl 64, id 47114, offset 0, flags [DF], proto TCP (6), length 196) d310 1 a310 1 112 2013-11-01 10:02:19.815724 IP (tos 0x0, ttl 64, id 47070, offset 0, flags [DF], proto TCP (6), length 52) d312 1 a312 1 113 2013-11-01 10:02:20.713618 IP (tos 0x0, ttl 64, id 47071, offset 0, flags [DF], proto TCP (6), length 76) d315 1 a315 1 114 2013-11-01 10:02:20.714133 IP (tos 0x0, ttl 64, id 47115, offset 0, flags [DF], proto TCP (6), length 132) d318 1 a318 1 115 2013-11-01 10:02:20.714160 IP (tos 0x0, ttl 64, id 47072, offset 0, flags [DF], proto TCP (6), length 52) d320 1 a320 1 116 2013-11-01 10:02:21.229978 IP (tos 0x0, ttl 64, id 47073, offset 0, flags [DF], proto TCP (6), length 60) d323 1 a323 1 117 2013-11-01 10:02:21.231013 IP (tos 0x0, ttl 64, id 47116, offset 0, flags [DF], proto TCP (6), length 60) d326 1 a326 1 118 2013-11-01 10:02:21.231044 IP (tos 0x0, ttl 64, id 47074, offset 0, flags [DF], proto TCP (6), length 52) d328 1 a328 1 119 2013-11-01 10:02:21.852874 IP (tos 0x0, ttl 64, id 47075, offset 0, flags [DF], proto TCP (6), length 68) d331 1 a331 1 120 2013-11-01 10:02:21.853489 IP (tos 0x0, ttl 64, id 47117, offset 0, flags [DF], proto TCP (6), length 84) d334 1 a334 1 121 2013-11-01 10:02:21.853515 IP (tos 0x0, ttl 64, id 47076, offset 0, flags [DF], proto TCP (6), length 52) d336 1 a336 1 122 2013-11-01 10:30:09.945368 IP (tos 0x0, ttl 64, id 54874, offset 0, flags [DF], proto TCP (6), length 60) d339 1 a339 1 123 2013-11-01 10:30:09.946140 IP (tos 0x0, ttl 64, id 56416, offset 0, flags [DF], proto TCP (6), length 60) d342 1 a342 1 124 2013-11-01 10:30:09.946173 IP (tos 0x0, ttl 64, id 54875, offset 0, flags [DF], proto TCP (6), length 52) d344 1 a344 1 125 2013-11-01 10:30:10.672306 IP (tos 0x0, ttl 64, id 54876, offset 0, flags [DF], proto TCP (6), length 68) d347 1 a347 1 126 2013-11-01 10:30:10.673261 IP (tos 0x0, ttl 64, id 56417, offset 0, flags [DF], proto TCP (6), length 11844) d350 1 a350 1 127 2013-11-01 10:30:10.673292 IP (tos 0x0, ttl 64, id 54877, offset 0, flags [DF], proto TCP (6), length 52) d352 1 a352 1 128 2013-11-01 10:30:10.675065 IP (tos 0x0, ttl 64, id 56418, offset 0, flags [DF], proto TCP (6), length 11844) d355 1 a355 1 129 2013-11-01 10:30:10.675124 IP (tos 0x0, ttl 64, id 54878, offset 0, flags [DF], proto TCP (6), length 52) d357 1 a357 1 130 2013-11-01 10:30:10.675159 IP (tos 0x0, ttl 64, id 56419, offset 0, flags [DF], proto TCP (6), length 11844) d360 1 a360 1 131 2013-11-01 10:30:10.675174 IP (tos 0x0, ttl 64, id 54879, offset 0, flags [DF], proto TCP (6), length 52) d362 1 a362 1 132 2013-11-01 10:30:10.675194 IP (tos 0x0, ttl 64, id 56420, offset 0, flags [DF], proto TCP (6), length 11844) d365 1 a365 1 133 2013-11-01 10:30:10.675206 IP (tos 0x0, ttl 64, id 54880, offset 0, flags [DF], proto TCP (6), length 52) d367 1 a367 1 134 2013-11-01 10:30:10.675226 IP (tos 0x0, ttl 64, id 56421, offset 0, flags [DF], proto TCP (6), length 11844) d370 1 a370 1 135 2013-11-01 10:30:10.675238 IP (tos 0x0, ttl 64, id 54881, offset 0, flags [DF], proto TCP (6), length 52) d372 1 a372 1 136 2013-11-01 10:30:10.675257 IP (tos 0x0, ttl 64, id 56422, offset 0, flags [DF], proto TCP (6), length 11844) d375 1 a375 1 137 2013-11-01 10:30:10.675294 IP (tos 0x0, ttl 64, id 56423, offset 0, flags [DF], proto TCP (6), length 11844) d378 1 a378 1 138 2013-11-01 10:30:10.675314 IP (tos 0x0, ttl 64, id 56424, offset 0, flags [DF], proto TCP (6), length 11844) d381 1 a381 1 139 2013-11-01 10:30:10.675325 IP (tos 0x0, ttl 64, id 54882, offset 0, flags [DF], proto TCP (6), length 52) d383 1 a383 1 140 2013-11-01 10:30:10.712539 IP (tos 0x0, ttl 64, id 54883, offset 0, flags [DF], proto TCP (6), length 52) d385 1 a385 1 141 2013-11-01 10:46:50.838754 IP (tos 0x0, ttl 64, id 46973, offset 0, flags [DF], proto TCP (6), length 68) d388 1 a388 1 142 2013-11-01 10:46:50.839431 IP (tos 0x0, ttl 64, id 43209, offset 0, flags [DF], proto TCP (6), length 388) d391 1 a391 1 143 2013-11-01 10:46:50.839471 IP (tos 0x0, ttl 64, id 46974, offset 0, flags [DF], proto TCP (6), length 52) d393 1 a393 1 144 2013-11-02 19:45:16.495434 IP (tos 0x0, ttl 64, id 17712, offset 0, flags [DF], proto TCP (6), length 60) d396 1 a396 1 145 2013-11-02 19:45:16.496030 IP (tos 0x0, ttl 64, id 23686, offset 0, flags [DF], proto TCP (6), length 60) d399 1 a399 1 146 2013-11-02 19:45:16.496057 IP (tos 0x0, ttl 64, id 17713, offset 0, flags [DF], proto TCP (6), length 52) d401 1 a401 1 147 2013-11-02 19:45:17.176752 IP (tos 0x0, ttl 64, id 17714, offset 0, flags [DF], proto TCP (6), length 68) d405 1 a405 1 148 2013-11-02 19:45:17.215970 IP (tos 0x0, ttl 64, id 23687, offset 0, flags [DF], proto TCP (6), length 52) d407 1 a407 1 149 2013-11-02 19:53:23.472776 IP (tos 0x0, ttl 64, id 17917, offset 0, flags [DF], proto TCP (6), length 92) d414 1 a414 1 150 2013-11-02 19:53:23.473744 IP (tos 0x0, ttl 64, id 23790, offset 0, flags [DF], proto TCP (6), length 132) d419 1 a419 1 151 2013-11-02 19:53:23.473777 IP (tos 0x0, ttl 64, id 17918, offset 0, flags [DF], proto TCP (6), length 52) d421 1 a421 1 152 2013-11-02 19:55:19.511983 IP (tos 0x0, ttl 64, id 17967, offset 0, flags [DF], proto TCP (6), length 60) d424 1 a424 1 153 2013-11-02 19:55:19.513048 IP (tos 0x0, ttl 64, id 23815, offset 0, flags [DF], proto TCP (6), length 60) d427 1 a427 1 154 2013-11-02 19:55:19.513081 IP (tos 0x0, ttl 64, id 17968, offset 0, flags [DF], proto TCP (6), length 52) d429 1 a429 1 155 2013-11-02 20:10:12.609713 IP (tos 0x0, ttl 64, id 45627, offset 0, flags [DF], proto TCP (6), length 60) d432 1 a432 1 156 2013-11-02 20:10:12.610357 IP (tos 0x0, ttl 64, id 49206, offset 0, flags [DF], proto TCP (6), length 60) d435 1 a435 1 157 2013-11-02 20:10:12.610382 IP (tos 0x0, ttl 64, id 45628, offset 0, flags [DF], proto TCP (6), length 52) d437 1 a437 1 158 2013-11-02 20:10:13.364783 IP (tos 0x0, ttl 64, id 45629, offset 0, flags [DF], proto TCP (6), length 68) d441 1 a441 1 159 2013-11-02 20:10:13.366754 IP (tos 0x0, ttl 64, id 49207, offset 0, flags [DF], proto TCP (6), length 132) d444 1 a444 1 160 2013-11-02 20:10:13.366788 IP (tos 0x0, ttl 64, id 45630, offset 0, flags [DF], proto TCP (6), length 52) d446 1 a446 1 161 2013-11-02 20:24:40.574081 IP (tos 0x0, ttl 64, id 45979, offset 0, flags [DF], proto TCP (6), length 76) d450 1 a450 1 162 2013-11-02 20:24:40.574726 IP (tos 0x0, ttl 64, id 49382, offset 0, flags [DF], proto TCP (6), length 76) d454 1 a454 1 163 2013-11-02 20:24:40.574748 IP (tos 0x0, ttl 64, id 45980, offset 0, flags [DF], proto TCP (6), length 52) d456 1 a456 1 164 2013-11-02 20:28:52.608224 IP (tos 0x0, ttl 64, id 46086, offset 0, flags [DF], proto TCP (6), length 60) d459 1 a459 1 165 2013-11-02 20:28:52.609219 IP (tos 0x0, ttl 64, id 49437, offset 0, flags [DF], proto TCP (6), length 60) d462 1 a462 1 166 2013-11-02 20:28:52.609246 IP (tos 0x0, ttl 64, id 46087, offset 0, flags [DF], proto TCP (6), length 52) d464 1 a464 1 167 2013-11-02 20:28:54.103683 IP (tos 0x0, ttl 64, id 46088, offset 0, flags [DF], proto TCP (6), length 84) d473 1 a473 1 168 2013-11-02 20:28:54.140673 IP (tos 0x0, ttl 64, id 49438, offset 0, flags [DF], proto TCP (6), length 52) d475 1 a475 1 169 2013-11-02 20:28:56.308694 IP (tos 0x0, ttl 64, id 46089, offset 0, flags [DF], proto TCP (6), length 60) d478 1 a478 1 170 2013-11-02 20:28:56.308754 IP (tos 0x0, ttl 64, id 49439, offset 0, flags [DF], proto TCP (6), length 52) d480 1 a480 1 171 2013-11-02 20:28:56.309209 IP (tos 0x0, ttl 64, id 49440, offset 0, flags [DF], proto TCP (6), length 84) d489 1 a489 1 172 2013-11-02 20:28:56.309230 IP (tos 0x0, ttl 64, id 46090, offset 0, flags [DF], proto TCP (6), length 52) d491 1 a491 1 173 2013-11-02 20:37:22.358712 IP (tos 0x0, ttl 64, id 18246, offset 0, flags [DF], proto TCP (6), length 100) d494 1 a494 1 174 2013-11-02 20:37:22.396699 IP (tos 0x0, ttl 64, id 23571, offset 0, flags [DF], proto TCP (6), length 52) @ 1.1.1.2 log @Import tcpdump-4.99.5, previous was 4.99.4 Friday, August 30, 2024 / The Tcpdump Group Summary for 4.99.5 tcpdump release Refine protocol decoding for: Arista: Use the test .pcap file from pull request #955 (HwInfo). BGP: Fix an undefined behavior when it tries to parse a too-short packet. CARP: Print the protocol name before any GET_(). CDP: only hex-dump unknown TLVs in verbose mode. DHCP: parse the SZTP redirect tag. DHCPv6: client-id/server-id DUID type 2 correction; parse the user class, boot file URL, and SZTP redirect options; add DUID-UUID printing (RFC6355). DNS: Detect and correctly handle too-short URI RRs. EAP: Assign ndo_protocol in the eap_print() function. ESP: Don't use EVP_add_cipher_alias() (fixes building on OpenBSD 7.5). Frame Relay (Multilink): Fix the Timestamp Information Element printing. ICMPv6: Fix printing the Home Agent Address Discovery Reply Message. IEEE 802.11: no need for an element ID in the structures for IEs, make the length in the IE structures a u_int, include the "TA" field while printing Block Ack Control frame. IP: Enable TSO (TCP Segmentation Offload) support; fix printing invalid cases as invalid, not truncated; use ND_ICHECKMSG_ZU() to test the header length. IPv6: Fix printing invalid cases as invalid, not truncated; use ND_ICHECKMSG_U() to print an invalid version. IPv6: Fix invalid 32-bit versus 64-bit printouts of fragment headers. ISAKMP: Fix printing Delete payload SPI when size is zero. Kerberos: Print the protocol name, remove a redundant bounds check. lwres: Fix an undefined behavior in pointer arithmetic. OpenFlow 1.0: Fix indentation of PORT_MOD, improve handling of some lengths, and fix handling of snapend. TCP: Test ports < 1024 in port order to select the printer. UDP: Move source port equal BCM_LI_PORT to bottom of long if else chain. UDP: Test ports < 1024 in port order to select the printer. LDP: Add missing fields of the Common Session Parameters TLV and fix the offset for the A&D bits. NFLOG: Use correct AF code points on all OSes. NFS: Avoid printing non-ASCII characters. OSPF: Pad TLVs in LS_OPAQUE_TYPE_RI to multiples of 4 bytes. OSPF: Update LS-Ack printing not to run off the end of the packet. OSPF6: Fix an undefined behavior. pflog: use nd_ types in struct pfloghdr. PPP: Check if there is some data to hexdump. PPP: Remove an extra colon before LCP Callback Operation. Use the buffer stack for de-escaping PPP; fixes CVE-2024-2397; Note: This problem does not affect any tcpdump release. PTP: Fix spelling of type SIGNALING, Parse major and minor version correctly, Print majorSdoId field instead of just the first bit. RIP: Make a couple trivial protocol updates. RPKI-Router: Refine length and bounds checks. RX: Use the "%Y-%m-%d" date format. smbutil.c: Use the "%Y-%m-%d" date format. SNMP: Fix two undefined behaviors. Text protocols: Fix printing truncation if it is not the case. ZEP: Use the "%Y-%m-%d" date format. ZMTP: Replace custom code with bittok2str(). User interface: Print the supported time stamp types (-J) to stdout instead of stderr. Print the list of data link types (-L) to stdout instead of stderr. Use symmetrical quotation characters in error messages. Update --version option to print 32/64-bit build and time_t size. Improve error messages for invalid interface indexes specified with -i. Support "3des" as an alias for "des_ede3_cbc" even if the crypto library doesn't support adding aliases. Source code: tcpdump: Fix a memory leak. child_cleanup: reap as many child processes as possible. Ignore failures when setting the default "any" device DLL to LINUX_SLL2. Fix for backends which doesn't support capsicum. Update ND_BYTES_BETWEEN() macro for better accuracy. Update ND_BYTES_AVAILABLE_AFTER() macro for better accuracy. Introduce new ND_ICHECK*() macros to deduplicate more code. Skip privilege dropping when using -Z root on --with-user builds. Add a nd_printjn() function. Make nd_trunc_longjmp() not static inline. Include from netdissect.h. Remove init_crc10_table() and the entourage. Initialize tzcode early. Capsicum support: Fix a 'not defined' macro error. Update the "Error converting time" tests for packet times. Fix warnings when building for 32-bit and defining _TIME_BITS=64. Free interface list just before exiting where it wasn't being freed. Building and testing: Add a configure option to help debugging (--enable-instrument-functions). At build time require a proof of suitable snprintf(3) implementation in libc (and document Solaris 9 as unsupported because of that). Makefile.in: Add two "touch .devel" commands in the releasecheck target. Autoconf: Get --with-user and --with-chroot right. Autoconf: Fix --static-pcap-only test on Solaris 10. Autoconf: Add some warning flags for clang 13 or newer. Autoconf: Update config.{guess,sub}, timestamps 2024-01-01. Autoconf: Add autogen.sh, remove configure and config.h.in and put these generated files in the release tarball. Autoconf: Update the install-sh script to the 2020-11-14.01 version. configure: Apply autoupdate 2.69. CMake: improve the comment before project(tcpdump C). Do not require vsnprintf(). tests: Use the -tttt option, by default, for the tests. Autoconf, CMake: Get the size of a void * and a time_t. Fix propagation of cc_werr_cflags() output. Makefile.in: Fix the depend target. mkdep: Exit with a non-zero status if a command fails. Autoconf: use V_INCLS to update the list of include search paths. Autoconf: don't put anything before -I and -L flags for local libpcap. Autoconf, CMake: work around an Xcode 15+ issue. Autoconf, CMake: use pkg-config and Homebrew when looking for libcrypto. Fix Sun C invocation from CMake. mkdep: Use TMPDIR if it is set and not null. Add initial support for building with TinyCC. Makefile.in: Use the variable MAKE instead of the make command. Makefile.in: Add instrumentation configuration in releasecheck target. Make various improvements to the TESTrun script. Untangle detection of pcap_findalldevs(). Autoconf: don't use egrep, use $EGREP. Autoconf: check for gethostbyaddr(), not gethostbyname(). Autoconf, CMake: search for gethostbyaddr() in libnetwork. Make illumos build warning-free. Documentation: Fixed errors in doc/README.Win32.md and renamed it to README.windows.md. Make various improvements to the man page. Add initial README file for Haiku. Make various improvements to CONTRIBUTING.md. @ text @d1 1 a1 1 1 2013-10-19 15:52:49.322823 IP (tos 0x0, ttl 64, id 348, offset 0, flags [DF], proto TCP (6), length 236) d4 1 a4 1 2 2013-10-19 15:52:49.362355 IP (tos 0x0, ttl 64, id 61731, offset 0, flags [DF], proto TCP (6), length 52) d6 1 a6 1 3 2013-10-19 15:52:49.367093 IP (tos 0x0, ttl 64, id 349, offset 0, flags [DF], proto TCP (6), length 60) d9 1 a9 1 4 2013-10-19 15:52:49.367137 IP (tos 0x0, ttl 64, id 61732, offset 0, flags [DF], proto TCP (6), length 52) d11 1 a11 1 5 2013-10-19 15:52:49.367403 IP (tos 0x0, ttl 64, id 61733, offset 0, flags [DF], proto TCP (6), length 60) d14 1 a14 1 6 2013-10-19 15:52:49.367421 IP (tos 0x0, ttl 64, id 350, offset 0, flags [DF], proto TCP (6), length 52) d16 1 a16 1 7 2013-10-20 12:15:37.979676 IP (tos 0x0, ttl 64, id 46225, offset 0, flags [DF], proto TCP (6), length 420) d19 1 a19 1 8 2013-10-20 12:15:37.985455 IP (tos 0x0, ttl 64, id 55504, offset 0, flags [DF], proto TCP (6), length 432) d24 1 a24 1 9 2013-10-20 12:15:37.985482 IP (tos 0x0, ttl 64, id 46226, offset 0, flags [DF], proto TCP (6), length 52) d26 1 a26 1 10 2013-10-21 14:53:56.336558 IP (tos 0x0, ttl 64, id 63838, offset 0, flags [DF], proto TCP (6), length 172) d29 1 a29 1 11 2013-10-21 14:53:56.339805 IP (tos 0x0, ttl 64, id 30929, offset 0, flags [DF], proto TCP (6), length 184) d34 1 a34 1 12 2013-10-21 14:53:56.339839 IP (tos 0x0, ttl 64, id 63839, offset 0, flags [DF], proto TCP (6), length 52) d36 1 a36 1 13 2013-10-22 07:06:07.923021 IP (tos 0x0, ttl 64, id 53050, offset 0, flags [DF], proto TCP (6), length 60) d38 1 a38 1 14 2013-10-22 07:06:07.923406 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) d40 1 a40 1 15 2013-10-22 07:06:11.948050 IP (tos 0x0, ttl 64, id 25056, offset 0, flags [DF], proto TCP (6), length 60) d42 1 a42 1 16 2013-10-22 07:06:11.948123 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) d44 1 a44 1 17 2013-10-22 07:06:11.948171 IP (tos 0x0, ttl 64, id 25057, offset 0, flags [DF], proto TCP (6), length 52) d46 1 a46 1 18 2013-10-22 07:06:11.948588 IP (tos 0x0, ttl 64, id 25058, offset 0, flags [DF], proto TCP (6), length 60) d49 1 a49 1 19 2013-10-22 07:06:11.948646 IP (tos 0x0, ttl 64, id 60701, offset 0, flags [DF], proto TCP (6), length 52) d51 1 a51 1 20 2013-10-22 07:06:11.951581 IP (tos 0x0, ttl 64, id 60702, offset 0, flags [DF], proto TCP (6), length 60) d54 1 a54 1 21 2013-10-22 07:06:11.951654 IP (tos 0x0, ttl 64, id 25059, offset 0, flags [DF], proto TCP (6), length 52) d56 1 a56 1 22 2013-10-22 07:06:11.954851 IP (tos 0x0, ttl 64, id 25060, offset 0, flags [DF], proto TCP (6), length 150) d61 1 a61 1 23 2013-10-22 07:06:11.956875 IP (tos 0x0, ttl 64, id 25061, offset 0, flags [DF], proto TCP (6), length 52) d63 1 a63 1 24 2013-10-22 07:06:11.995263 IP (tos 0x0, ttl 64, id 60703, offset 0, flags [DF], proto TCP (6), length 52) d65 1 a65 1 25 2013-10-22 07:06:11.996996 IP (tos 0x0, ttl 64, id 60704, offset 0, flags [DF], proto TCP (6), length 60) d68 1 a68 1 26 2013-10-22 07:06:11.997117 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) d70 1 a70 1 27 2013-10-22 20:23:02.447284 IP (tos 0x0, ttl 64, id 5822, offset 0, flags [DF], proto TCP (6), length 60) d73 1 a73 1 28 2013-10-22 20:23:02.487886 IP (tos 0x0, ttl 64, id 541, offset 0, flags [DF], proto TCP (6), length 52) d75 1 a75 1 29 2013-10-22 20:23:03.289931 IP (tos 0x0, ttl 64, id 5823, offset 0, flags [DF], proto TCP (6), length 60) d78 1 a78 1 30 2013-10-22 20:23:03.290134 IP (tos 0x0, ttl 64, id 542, offset 0, flags [DF], proto TCP (6), length 52) d80 1 a80 1 31 2013-10-22 20:23:03.292620 IP (tos 0x0, ttl 64, id 543, offset 0, flags [DF], proto TCP (6), length 60) d83 1 a83 1 32 2013-10-22 20:23:03.292690 IP (tos 0x0, ttl 64, id 5824, offset 0, flags [DF], proto TCP (6), length 52) d85 1 a85 1 33 2013-10-22 20:23:03.674363 IP (tos 0x0, ttl 64, id 5825, offset 0, flags [DF], proto TCP (6), length 68) d89 1 a89 1 34 2013-10-22 20:23:03.711246 IP (tos 0x0, ttl 64, id 544, offset 0, flags [DF], proto TCP (6), length 52) d91 1 a91 1 35 2013-10-24 09:18:28.508689 IP (tos 0x0, ttl 64, id 8726, offset 0, flags [DF], proto TCP (6), length 60) d94 1 a94 1 36 2013-10-24 09:18:28.512206 IP (tos 0x0, ttl 64, id 48675, offset 0, flags [DF], proto TCP (6), length 60) d97 1 a97 1 37 2013-10-24 09:18:28.512310 IP (tos 0x0, ttl 64, id 8727, offset 0, flags [DF], proto TCP (6), length 52) d99 1 a99 1 38 2013-10-24 09:18:29.938866 IP (tos 0x0, ttl 64, id 8728, offset 0, flags [DF], proto TCP (6), length 73) d103 1 a103 1 39 2013-10-24 09:18:29.940525 IP (tos 0x0, ttl 64, id 48676, offset 0, flags [DF], proto TCP (6), length 73) d107 1 a107 1 40 2013-10-24 09:18:29.940621 IP (tos 0x0, ttl 64, id 8729, offset 0, flags [DF], proto TCP (6), length 52) d109 1 a109 1 41 2013-10-24 15:41:10.777155 IP (tos 0x0, ttl 64, id 14454, offset 0, flags [DF], proto TCP (6), length 68) d113 1 a113 1 42 2013-10-24 15:41:10.782182 IP (tos 0x0, ttl 64, id 51401, offset 0, flags [DF], proto TCP (6), length 80) d118 1 a118 1 43 2013-10-24 15:41:10.782279 IP (tos 0x0, ttl 64, id 14455, offset 0, flags [DF], proto TCP (6), length 52) d120 1 a120 1 44 2013-10-24 15:41:10.978145 IP (tos 0x0, ttl 64, id 14456, offset 0, flags [DF], proto TCP (6), length 60) d123 1 a123 1 45 2013-10-24 15:41:10.981725 IP (tos 0x0, ttl 64, id 51402, offset 0, flags [DF], proto TCP (6), length 60) d126 1 a126 1 46 2013-10-24 15:41:10.981828 IP (tos 0x0, ttl 64, id 14457, offset 0, flags [DF], proto TCP (6), length 52) d128 1 a128 1 47 2013-10-24 15:41:11.640555 IP (tos 0x0, ttl 64, id 14458, offset 0, flags [DF], proto TCP (6), length 85) d133 1 a133 1 48 2013-10-24 15:41:11.649632 IP (tos 0x0, ttl 64, id 51403, offset 0, flags [DF], proto TCP (6), length 97) d138 1 a138 1 49 2013-10-24 15:41:11.649721 IP (tos 0x0, ttl 64, id 14459, offset 0, flags [DF], proto TCP (6), length 52) d140 1 a140 1 50 2013-10-24 15:47:18.960105 IP (tos 0x0, ttl 64, id 14608, offset 0, flags [DF], proto TCP (6), length 60) d143 1 a143 1 51 2013-10-24 15:47:18.962238 IP (tos 0x0, ttl 64, id 51478, offset 0, flags [DF], proto TCP (6), length 84) d148 1 a148 1 52 2013-10-24 15:47:18.962333 IP (tos 0x0, ttl 64, id 14609, offset 0, flags [DF], proto TCP (6), length 52) d150 1 a150 1 53 2013-10-24 16:32:34.623939 IP (tos 0x0, ttl 64, id 44797, offset 0, flags [DF], proto TCP (6), length 60) d153 1 a153 1 54 2013-10-24 16:32:34.625658 IP (tos 0x0, ttl 64, id 3493, offset 0, flags [DF], proto TCP (6), length 60) d156 1 a156 1 55 2013-10-24 16:32:34.625750 IP (tos 0x0, ttl 64, id 44798, offset 0, flags [DF], proto TCP (6), length 52) d158 1 a158 1 56 2013-10-24 16:32:34.844806 IP (tos 0x0, ttl 64, id 44799, offset 0, flags [DF], proto TCP (6), length 64) d162 1 a162 1 57 2013-10-24 16:32:34.883698 IP (tos 0x0, ttl 64, id 3494, offset 0, flags [DF], proto TCP (6), length 52) d164 1 a164 1 58 2013-10-24 16:32:36.376083 IP (tos 0x0, ttl 64, id 44800, offset 0, flags [DF], proto TCP (6), length 60) d167 1 a167 1 59 2013-10-24 16:32:36.376174 IP (tos 0x0, ttl 64, id 3495, offset 0, flags [DF], proto TCP (6), length 52) d169 1 a169 1 60 2013-10-24 16:32:36.378403 IP (tos 0x0, ttl 64, id 3496, offset 0, flags [DF], proto TCP (6), length 64) d173 1 a173 1 61 2013-10-24 16:32:36.378465 IP (tos 0x0, ttl 64, id 44801, offset 0, flags [DF], proto TCP (6), length 52) d175 1 a175 1 62 2013-10-24 17:39:10.589931 IP (tos 0x0, ttl 64, id 28700, offset 0, flags [DF], proto TCP (6), length 60) d178 1 a178 1 63 2013-10-24 17:39:10.592125 IP (tos 0x0, ttl 64, id 24186, offset 0, flags [DF], proto TCP (6), length 60) d181 1 a181 1 64 2013-10-24 17:39:10.592223 IP (tos 0x0, ttl 64, id 28701, offset 0, flags [DF], proto TCP (6), length 52) d183 1 a183 1 65 2013-10-24 17:39:11.275605 IP (tos 0x0, ttl 64, id 28702, offset 0, flags [DF], proto TCP (6), length 152) d186 1 a186 1 66 2013-10-24 17:39:11.278453 IP (tos 0x0, ttl 64, id 24187, offset 0, flags [DF], proto TCP (6), length 206) d189 1 a189 1 67 2013-10-24 17:39:11.278747 IP (tos 0x0, ttl 64, id 28703, offset 0, flags [DF], proto TCP (6), length 52) d191 1 a191 1 68 2013-10-24 17:39:11.293620 IP (tos 0x0, ttl 64, id 28704, offset 0, flags [DF], proto TCP (6), length 152) d194 1 a194 1 69 2013-10-24 17:39:11.296836 IP (tos 0x0, ttl 64, id 24188, offset 0, flags [DF], proto TCP (6), length 234) d197 1 a197 1 70 2013-10-24 17:39:11.334896 IP (tos 0x0, ttl 64, id 28705, offset 0, flags [DF], proto TCP (6), length 52) d199 1 a199 1 71 2013-10-25 10:22:45.030583 IP (tos 0x0, ttl 64, id 10058, offset 0, flags [DF], proto TCP (6), length 148) d202 1 a202 1 72 2013-10-25 10:22:45.067011 IP (tos 0x0, ttl 64, id 11330, offset 0, flags [DF], proto TCP (6), length 52) d204 1 a204 1 73 2013-10-25 10:22:46.038093 IP (tos 0x0, ttl 64, id 11331, offset 0, flags [DF], proto TCP (6), length 116) d207 1 a207 1 74 2013-10-25 10:22:46.038127 IP (tos 0x0, ttl 64, id 10059, offset 0, flags [DF], proto TCP (6), length 52) d209 1 a209 1 75 2013-10-25 13:15:24.725748 IP (tos 0x0, ttl 64, id 51120, offset 0, flags [DF], proto TCP (6), length 132) d214 1 a214 1 76 2013-10-25 13:15:24.725788 IP (tos 0x0, ttl 64, id 64306, offset 0, flags [DF], proto TCP (6), length 52) d216 1 a216 1 77 2013-10-31 16:37:49.792852 IP (tos 0x0, ttl 64, id 32480, offset 0, flags [DF], proto TCP (6), length 68) d219 1 a219 1 78 2013-10-31 16:37:49.796567 IP (tos 0x0, ttl 64, id 16409, offset 0, flags [DF], proto TCP (6), length 1124) d222 1 a222 1 79 2013-10-31 16:37:49.796657 IP (tos 0x0, ttl 64, id 32481, offset 0, flags [DF], proto TCP (6), length 52) d224 1 a224 1 80 2013-10-31 17:10:39.694164 IP (tos 0x0, ttl 64, id 18557, offset 0, flags [DF], proto TCP (6), length 116) d227 1 a227 1 81 2013-10-31 17:10:39.695936 IP (tos 0x0, ttl 64, id 19461, offset 0, flags [DF], proto TCP (6), length 236) d230 1 a230 1 82 2013-10-31 17:10:39.696001 IP (tos 0x0, ttl 64, id 18558, offset 0, flags [DF], proto TCP (6), length 52) d232 1 a232 1 83 2013-10-31 17:10:39.706507 IP (tos 0x0, ttl 64, id 18559, offset 0, flags [DF], proto TCP (6), length 116) d235 1 a235 1 84 2013-10-31 17:10:39.708491 IP (tos 0x0, ttl 64, id 19462, offset 0, flags [DF], proto TCP (6), length 92) d238 1 a238 1 85 2013-10-31 17:10:39.747947 IP (tos 0x0, ttl 64, id 18560, offset 0, flags [DF], proto TCP (6), length 52) d240 1 a240 1 86 2013-10-31 17:20:21.268792 IP (tos 0x0, ttl 64, id 18795, offset 0, flags [DF], proto TCP (6), length 68) d243 1 a243 1 87 2013-10-31 17:20:21.270799 IP (tos 0x0, ttl 64, id 19580, offset 0, flags [DF], proto TCP (6), length 1604) d246 1 a246 1 88 2013-10-31 17:20:21.270887 IP (tos 0x0, ttl 64, id 18796, offset 0, flags [DF], proto TCP (6), length 52) d248 1 a248 1 89 2013-10-31 17:21:32.610984 IP (tos 0x0, ttl 64, id 18829, offset 0, flags [DF], proto TCP (6), length 76) d251 1 a251 1 90 2013-10-31 17:21:32.614400 IP (tos 0x0, ttl 64, id 19597, offset 0, flags [DF], proto TCP (6), length 628) d254 1 a254 1 91 2013-10-31 17:21:32.614511 IP (tos 0x0, ttl 64, id 18830, offset 0, flags [DF], proto TCP (6), length 52) d256 1 a256 1 92 2013-10-31 17:21:32.932077 IP (tos 0x0, ttl 64, id 18831, offset 0, flags [DF], proto TCP (6), length 60) d259 1 a259 1 93 2013-10-31 17:21:32.939513 IP (tos 0x0, ttl 64, id 19598, offset 0, flags [DF], proto TCP (6), length 60) d262 1 a262 1 94 2013-10-31 17:21:32.939617 IP (tos 0x0, ttl 64, id 18832, offset 0, flags [DF], proto TCP (6), length 52) d264 1 a264 1 95 2013-10-31 17:27:12.201785 IP (tos 0x0, ttl 64, id 18969, offset 0, flags [DF], proto TCP (6), length 76) d267 1 a267 1 96 2013-10-31 17:27:12.204185 IP (tos 0x0, ttl 64, id 19667, offset 0, flags [DF], proto TCP (6), length 228) d270 1 a270 1 97 2013-10-31 17:27:12.204269 IP (tos 0x0, ttl 64, id 18970, offset 0, flags [DF], proto TCP (6), length 52) d272 1 a272 1 98 2013-10-31 17:27:12.931668 IP (tos 0x0, ttl 64, id 18971, offset 0, flags [DF], proto TCP (6), length 60) d275 1 a275 1 99 2013-10-31 17:27:12.938585 IP (tos 0x0, ttl 64, id 19668, offset 0, flags [DF], proto TCP (6), length 60) d278 1 a278 1 100 2013-10-31 17:27:12.938697 IP (tos 0x0, ttl 64, id 18972, offset 0, flags [DF], proto TCP (6), length 52) d280 1 a280 1 101 2013-10-31 17:57:16.110186 IP (tos 0x0, ttl 64, id 16966, offset 0, flags [DF], proto TCP (6), length 76) d283 1 a283 1 102 2013-10-31 17:57:16.113738 IP (tos 0x0, ttl 64, id 22868, offset 0, flags [DF], proto TCP (6), length 252) d286 1 a286 1 103 2013-10-31 17:57:16.113974 IP (tos 0x0, ttl 64, id 16967, offset 0, flags [DF], proto TCP (6), length 52) d288 1 a288 1 104 2013-10-31 17:57:17.127188 IP (tos 0x0, ttl 64, id 16968, offset 0, flags [DF], proto TCP (6), length 68) d291 1 a291 1 105 2013-10-31 17:57:17.129487 IP (tos 0x0, ttl 64, id 22869, offset 0, flags [DF], proto TCP (6), length 204) d294 1 a294 1 106 2013-10-31 17:57:17.130202 IP (tos 0x0, ttl 64, id 16969, offset 0, flags [DF], proto TCP (6), length 52) d296 1 a296 1 107 2013-10-31 17:57:17.869382 IP (tos 0x0, ttl 64, id 16970, offset 0, flags [DF], proto TCP (6), length 68) d299 1 a299 1 108 2013-10-31 17:57:17.871408 IP (tos 0x0, ttl 64, id 22870, offset 0, flags [DF], proto TCP (6), length 108) d302 1 a302 1 109 2013-10-31 17:57:17.871493 IP (tos 0x0, ttl 64, id 16971, offset 0, flags [DF], proto TCP (6), length 52) d304 1 a304 1 110 2013-11-01 10:02:19.814878 IP (tos 0x0, ttl 64, id 47069, offset 0, flags [DF], proto TCP (6), length 76) d307 1 a307 1 111 2013-11-01 10:02:19.815701 IP (tos 0x0, ttl 64, id 47114, offset 0, flags [DF], proto TCP (6), length 196) d310 1 a310 1 112 2013-11-01 10:02:19.815724 IP (tos 0x0, ttl 64, id 47070, offset 0, flags [DF], proto TCP (6), length 52) d312 1 a312 1 113 2013-11-01 10:02:20.713618 IP (tos 0x0, ttl 64, id 47071, offset 0, flags [DF], proto TCP (6), length 76) d315 1 a315 1 114 2013-11-01 10:02:20.714133 IP (tos 0x0, ttl 64, id 47115, offset 0, flags [DF], proto TCP (6), length 132) d318 1 a318 1 115 2013-11-01 10:02:20.714160 IP (tos 0x0, ttl 64, id 47072, offset 0, flags [DF], proto TCP (6), length 52) d320 1 a320 1 116 2013-11-01 10:02:21.229978 IP (tos 0x0, ttl 64, id 47073, offset 0, flags [DF], proto TCP (6), length 60) d323 1 a323 1 117 2013-11-01 10:02:21.231013 IP (tos 0x0, ttl 64, id 47116, offset 0, flags [DF], proto TCP (6), length 60) d326 1 a326 1 118 2013-11-01 10:02:21.231044 IP (tos 0x0, ttl 64, id 47074, offset 0, flags [DF], proto TCP (6), length 52) d328 1 a328 1 119 2013-11-01 10:02:21.852874 IP (tos 0x0, ttl 64, id 47075, offset 0, flags [DF], proto TCP (6), length 68) d331 1 a331 1 120 2013-11-01 10:02:21.853489 IP (tos 0x0, ttl 64, id 47117, offset 0, flags [DF], proto TCP (6), length 84) d334 1 a334 1 121 2013-11-01 10:02:21.853515 IP (tos 0x0, ttl 64, id 47076, offset 0, flags [DF], proto TCP (6), length 52) d336 1 a336 1 122 2013-11-01 10:30:09.945368 IP (tos 0x0, ttl 64, id 54874, offset 0, flags [DF], proto TCP (6), length 60) d339 1 a339 1 123 2013-11-01 10:30:09.946140 IP (tos 0x0, ttl 64, id 56416, offset 0, flags [DF], proto TCP (6), length 60) d342 1 a342 1 124 2013-11-01 10:30:09.946173 IP (tos 0x0, ttl 64, id 54875, offset 0, flags [DF], proto TCP (6), length 52) d344 1 a344 1 125 2013-11-01 10:30:10.672306 IP (tos 0x0, ttl 64, id 54876, offset 0, flags [DF], proto TCP (6), length 68) d347 1 a347 1 126 2013-11-01 10:30:10.673261 IP (tos 0x0, ttl 64, id 56417, offset 0, flags [DF], proto TCP (6), length 11844) d350 1 a350 1 127 2013-11-01 10:30:10.673292 IP (tos 0x0, ttl 64, id 54877, offset 0, flags [DF], proto TCP (6), length 52) d352 1 a352 1 128 2013-11-01 10:30:10.675065 IP (tos 0x0, ttl 64, id 56418, offset 0, flags [DF], proto TCP (6), length 11844) d355 1 a355 1 129 2013-11-01 10:30:10.675124 IP (tos 0x0, ttl 64, id 54878, offset 0, flags [DF], proto TCP (6), length 52) d357 1 a357 1 130 2013-11-01 10:30:10.675159 IP (tos 0x0, ttl 64, id 56419, offset 0, flags [DF], proto TCP (6), length 11844) d360 1 a360 1 131 2013-11-01 10:30:10.675174 IP (tos 0x0, ttl 64, id 54879, offset 0, flags [DF], proto TCP (6), length 52) d362 1 a362 1 132 2013-11-01 10:30:10.675194 IP (tos 0x0, ttl 64, id 56420, offset 0, flags [DF], proto TCP (6), length 11844) d365 1 a365 1 133 2013-11-01 10:30:10.675206 IP (tos 0x0, ttl 64, id 54880, offset 0, flags [DF], proto TCP (6), length 52) d367 1 a367 1 134 2013-11-01 10:30:10.675226 IP (tos 0x0, ttl 64, id 56421, offset 0, flags [DF], proto TCP (6), length 11844) d370 1 a370 1 135 2013-11-01 10:30:10.675238 IP (tos 0x0, ttl 64, id 54881, offset 0, flags [DF], proto TCP (6), length 52) d372 1 a372 1 136 2013-11-01 10:30:10.675257 IP (tos 0x0, ttl 64, id 56422, offset 0, flags [DF], proto TCP (6), length 11844) d375 1 a375 1 137 2013-11-01 10:30:10.675294 IP (tos 0x0, ttl 64, id 56423, offset 0, flags [DF], proto TCP (6), length 11844) d378 1 a378 1 138 2013-11-01 10:30:10.675314 IP (tos 0x0, ttl 64, id 56424, offset 0, flags [DF], proto TCP (6), length 11844) d381 1 a381 1 139 2013-11-01 10:30:10.675325 IP (tos 0x0, ttl 64, id 54882, offset 0, flags [DF], proto TCP (6), length 52) d383 1 a383 1 140 2013-11-01 10:30:10.712539 IP (tos 0x0, ttl 64, id 54883, offset 0, flags [DF], proto TCP (6), length 52) d385 1 a385 1 141 2013-11-01 10:46:50.838754 IP (tos 0x0, ttl 64, id 46973, offset 0, flags [DF], proto TCP (6), length 68) d388 1 a388 1 142 2013-11-01 10:46:50.839431 IP (tos 0x0, ttl 64, id 43209, offset 0, flags [DF], proto TCP (6), length 388) d391 1 a391 1 143 2013-11-01 10:46:50.839471 IP (tos 0x0, ttl 64, id 46974, offset 0, flags [DF], proto TCP (6), length 52) d393 1 a393 1 144 2013-11-02 19:45:16.495434 IP (tos 0x0, ttl 64, id 17712, offset 0, flags [DF], proto TCP (6), length 60) d396 1 a396 1 145 2013-11-02 19:45:16.496030 IP (tos 0x0, ttl 64, id 23686, offset 0, flags [DF], proto TCP (6), length 60) d399 1 a399 1 146 2013-11-02 19:45:16.496057 IP (tos 0x0, ttl 64, id 17713, offset 0, flags [DF], proto TCP (6), length 52) d401 1 a401 1 147 2013-11-02 19:45:17.176752 IP (tos 0x0, ttl 64, id 17714, offset 0, flags [DF], proto TCP (6), length 68) d405 1 a405 1 148 2013-11-02 19:45:17.215970 IP (tos 0x0, ttl 64, id 23687, offset 0, flags [DF], proto TCP (6), length 52) d407 1 a407 1 149 2013-11-02 19:53:23.472776 IP (tos 0x0, ttl 64, id 17917, offset 0, flags [DF], proto TCP (6), length 92) d414 1 a414 1 150 2013-11-02 19:53:23.473744 IP (tos 0x0, ttl 64, id 23790, offset 0, flags [DF], proto TCP (6), length 132) d419 1 a419 1 151 2013-11-02 19:53:23.473777 IP (tos 0x0, ttl 64, id 17918, offset 0, flags [DF], proto TCP (6), length 52) d421 1 a421 1 152 2013-11-02 19:55:19.511983 IP (tos 0x0, ttl 64, id 17967, offset 0, flags [DF], proto TCP (6), length 60) d424 1 a424 1 153 2013-11-02 19:55:19.513048 IP (tos 0x0, ttl 64, id 23815, offset 0, flags [DF], proto TCP (6), length 60) d427 1 a427 1 154 2013-11-02 19:55:19.513081 IP (tos 0x0, ttl 64, id 17968, offset 0, flags [DF], proto TCP (6), length 52) d429 1 a429 1 155 2013-11-02 20:10:12.609713 IP (tos 0x0, ttl 64, id 45627, offset 0, flags [DF], proto TCP (6), length 60) d432 1 a432 1 156 2013-11-02 20:10:12.610357 IP (tos 0x0, ttl 64, id 49206, offset 0, flags [DF], proto TCP (6), length 60) d435 1 a435 1 157 2013-11-02 20:10:12.610382 IP (tos 0x0, ttl 64, id 45628, offset 0, flags [DF], proto TCP (6), length 52) d437 1 a437 1 158 2013-11-02 20:10:13.364783 IP (tos 0x0, ttl 64, id 45629, offset 0, flags [DF], proto TCP (6), length 68) d441 1 a441 1 159 2013-11-02 20:10:13.366754 IP (tos 0x0, ttl 64, id 49207, offset 0, flags [DF], proto TCP (6), length 132) d444 1 a444 1 160 2013-11-02 20:10:13.366788 IP (tos 0x0, ttl 64, id 45630, offset 0, flags [DF], proto TCP (6), length 52) d446 1 a446 1 161 2013-11-02 20:24:40.574081 IP (tos 0x0, ttl 64, id 45979, offset 0, flags [DF], proto TCP (6), length 76) d450 1 a450 1 162 2013-11-02 20:24:40.574726 IP (tos 0x0, ttl 64, id 49382, offset 0, flags [DF], proto TCP (6), length 76) d454 1 a454 1 163 2013-11-02 20:24:40.574748 IP (tos 0x0, ttl 64, id 45980, offset 0, flags [DF], proto TCP (6), length 52) d456 1 a456 1 164 2013-11-02 20:28:52.608224 IP (tos 0x0, ttl 64, id 46086, offset 0, flags [DF], proto TCP (6), length 60) d459 1 a459 1 165 2013-11-02 20:28:52.609219 IP (tos 0x0, ttl 64, id 49437, offset 0, flags [DF], proto TCP (6), length 60) d462 1 a462 1 166 2013-11-02 20:28:52.609246 IP (tos 0x0, ttl 64, id 46087, offset 0, flags [DF], proto TCP (6), length 52) d464 1 a464 1 167 2013-11-02 20:28:54.103683 IP (tos 0x0, ttl 64, id 46088, offset 0, flags [DF], proto TCP (6), length 84) d473 1 a473 1 168 2013-11-02 20:28:54.140673 IP (tos 0x0, ttl 64, id 49438, offset 0, flags [DF], proto TCP (6), length 52) d475 1 a475 1 169 2013-11-02 20:28:56.308694 IP (tos 0x0, ttl 64, id 46089, offset 0, flags [DF], proto TCP (6), length 60) d478 1 a478 1 170 2013-11-02 20:28:56.308754 IP (tos 0x0, ttl 64, id 49439, offset 0, flags [DF], proto TCP (6), length 52) d480 1 a480 1 171 2013-11-02 20:28:56.309209 IP (tos 0x0, ttl 64, id 49440, offset 0, flags [DF], proto TCP (6), length 84) d489 1 a489 1 172 2013-11-02 20:28:56.309230 IP (tos 0x0, ttl 64, id 46090, offset 0, flags [DF], proto TCP (6), length 52) d491 1 a491 1 173 2013-11-02 20:37:22.358712 IP (tos 0x0, ttl 64, id 18246, offset 0, flags [DF], proto TCP (6), length 100) d494 1 a494 1 174 2013-11-02 20:37:22.396699 IP (tos 0x0, ttl 64, id 23571, offset 0, flags [DF], proto TCP (6), length 52) @