Here's the ethereal dump:
No. Time Source Destination Protocol Info
1 0.000000 10.133.1.49 10.133.1.123 TCP 35112
> 9102 [SYN] Seq=0 Ack=0 Win=5840 Len=0 MSS=1460 TSV=3528869741 TSER=0 WS=0
Frame 1 (74 bytes on wire, 74 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102),
Seq: 0, Ack: 0, Len: 0
Source port: 35112 (35112)
Destination port: 9102 (9102)
Sequence number: 0 (relative sequence number)
Header length: 40 bytes
Flags: 0x0002 (SYN)
Window size: 5840
Checksum: 0x2442 (correct)
Options: (20 bytes)
No. Time Source Destination Protocol Info
2 0.000105 10.133.1.123 10.133.1.49 TCP 9102 >
35112 [SYN, ACK] Seq=0 Ack=1 Win=16384 Len=0 MSS=1460 WS=0 TSV=0 TSER=0
Frame 2 (78 bytes on wire, 78 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:11:43:37:83:92
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112),
Seq: 0, Ack: 1, Len: 0
Source port: 9102 (9102)
Destination port: 35112 (35112)
Sequence number: 0 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 44 bytes
Flags: 0x0012 (SYN, ACK)
Window size: 16384
Checksum: 0x40c1 (correct)
Options: (24 bytes)
SEQ/ACK analysis
This is an ACK to the segment in frame: 1
The RTT to ACK the segment was: 0.000105000 seconds
No. Time Source Destination Protocol Info
3 0.000225 10.133.1.49 10.133.1.123 TCP 35112
> 9102 [ACK] Seq=1 Ack=1 Win=5840 Len=0 TSV=3528869742 TSER=0
Frame 3 (66 bytes on wire, 66 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102),
Seq: 1, Ack: 1, Len: 0
Source port: 35112 (35112)
Destination port: 9102 (9102)
Sequence number: 1 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 32 bytes
Flags: 0x0010 (ACK)
Window size: 5840
Checksum: 0x90f7 (correct)
Options: (12 bytes)
SEQ/ACK analysis
This is an ACK to the segment in frame: 2
The RTT to ACK the segment was: 0.000120000 seconds
No. Time Source Destination Protocol Info
4 0.000312 10.133.1.49 10.133.1.123 TCP 35112
> 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528869742 TSER=0
Frame 4 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102),
Seq: 1, Ack: 1, Len: 4
Source port: 35112 (35112)
Destination port: 9102 (9102)
Sequence number: 1 (relative sequence number)
Next sequence number: 5 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 32 bytes
Flags: 0x0018 (PSH, ACK)
Window size: 5840
Checksum: 0x90cd (correct)
Options: (12 bytes)
Data (4 bytes)
0000 00 00 00 1e ....
No. Time Source Destination Protocol Info
5 0.158994 10.133.1.123 10.133.1.49 TCP 9102 >
35112 [ACK] Seq=1 Ack=5 Win=65531 [CHECKSUM INCORRECT] Len=0 TSV=56609366
TSER=3528869741
Frame 5 (66 bytes on wire, 66 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112),
Seq: 1, Ack: 5, Len: 0
Source port: 9102 (9102)
Destination port: 35112 (35112)
Sequence number: 1 (relative sequence number)
Acknowledgement number: 5 (relative ack number)
Header length: 32 bytes
Flags: 0x0010 (ACK)
Window size: 65531
Checksum: 0x17dc (incorrect, should be 0xda12)
Options: (12 bytes)
SEQ/ACK analysis
This is an ACK to the segment in frame: 4
The RTT to ACK the segment was: 0.158682000 seconds
No. Time Source Destination Protocol Info
6 0.193624 10.133.1.49 10.133.1.123 TCP 35112
> 9102 [RST, ACK] Seq=5 Ack=1 Win=65531 Len=0 TSV=56609366 TSER=3528869741
Frame 6 (66 bytes on wire, 66 bytes captured)
Ethernet II, Src: 00:13:c3:75:19:7b, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102),
Seq: 5, Ack: 1, Len: 0
Source port: 35112 (35112)
Destination port: 9102 (9102)
Sequence number: 5 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 32 bytes
Flags: 0x0014 (RST, ACK)
Window size: 65531
Checksum: 0xda0e (correct)
Options: (12 bytes)
SEQ/ACK analysis
No. Time Source Destination Protocol Info
7 0.201763 10.133.1.49 10.133.1.123 TCP [TCP
Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528869943
TSER=0
Frame 7 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102),
Seq: 1, Ack: 1, Len: 4
Source port: 35112 (35112)
Destination port: 9102 (9102)
Sequence number: 1 (relative sequence number)
Next sequence number: 5 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 32 bytes
Flags: 0x0018 (PSH, ACK)
Window size: 5840
Checksum: 0x9004 (correct)
Options: (12 bytes)
SEQ/ACK analysis
TCP Analysis Flags
This frame is a (suspected) out-of-order segment
Data (4 bytes)
0000 00 00 00 1e ....
No. Time Source Destination Protocol Info
8 0.201782 10.133.1.123 10.133.1.49 TCP 9102 >
35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0
Frame 8 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112),
Seq: 1, Ack: 4239824515, Len: 0
Source port: 9102 (9102)
Destination port: 35112 (35112)
Sequence number: 1 (relative sequence number)
Header length: 20 bytes
Flags: 0x0004 (RST)
Window size: 0
Checksum: 0x6777 (correct)
No. Time Source Destination Protocol Info
9 0.603661 10.133.1.49 10.133.1.123 TCP [TCP
Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528870345
TSER=0
Frame 9 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102),
Seq: 1, Ack: 1, Len: 4
Source port: 35112 (35112)
Destination port: 9102 (9102)
Sequence number: 1 (relative sequence number)
Next sequence number: 5 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 32 bytes
Flags: 0x0018 (PSH, ACK)
Window size: 5840
Checksum: 0x8e72 (correct)
Options: (12 bytes)
SEQ/ACK analysis
TCP Analysis Flags
This frame is a (suspected) out-of-order segment
Data (4 bytes)
0000 00 00 00 1e ....
No. Time Source Destination Protocol Info
10 0.603675 10.133.1.123 10.133.1.49 TCP 9102 >
35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0
Frame 10 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112),
Seq: 1, Ack: 4239824515, Len: 0
Source port: 9102 (9102)
Destination port: 35112 (35112)
Sequence number: 1 (relative sequence number)
Header length: 20 bytes
Flags: 0x0004 (RST)
Window size: 0
Checksum: 0x6777 (correct)
SEQ/ACK analysis
No. Time Source Destination Protocol Info
11 1.407469 10.133.1.49 10.133.1.123 TCP [TCP
Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528871149
TSER=0
Frame 11 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102),
Seq: 1, Ack: 1, Len: 4
Source port: 35112 (35112)
Destination port: 9102 (9102)
Sequence number: 1 (relative sequence number)
Next sequence number: 5 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 32 bytes
Flags: 0x0018 (PSH, ACK)
Window size: 5840
Checksum: 0x8b4e (correct)
Options: (12 bytes)
SEQ/ACK analysis
TCP Analysis Flags
This frame is a (suspected) out-of-order segment
Data (4 bytes)
0000 00 00 00 1e ....
No. Time Source Destination Protocol Info
12 1.407492 10.133.1.123 10.133.1.49 TCP 9102 >
35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0
Frame 12 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112),
Seq: 1, Ack: 4239824515, Len: 0
Source port: 9102 (9102)
Destination port: 35112 (35112)
Sequence number: 1 (relative sequence number)
Header length: 20 bytes
Flags: 0x0004 (RST)
Window size: 0
Checksum: 0x6777 (correct)
SEQ/ACK analysis
No. Time Source Destination Protocol Info
13 3.015091 10.133.1.49 10.133.1.123 TCP [TCP
Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528872757
TSER=0
Frame 13 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102),
Seq: 1, Ack: 1, Len: 4
Source port: 35112 (35112)
Destination port: 9102 (9102)
Sequence number: 1 (relative sequence number)
Next sequence number: 5 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 32 bytes
Flags: 0x0018 (PSH, ACK)
Window size: 5840
Checksum: 0x8506 (correct)
Options: (12 bytes)
SEQ/ACK analysis
TCP Analysis Flags
This frame is a (suspected) out-of-order segment
Data (4 bytes)
0000 00 00 00 1e ....
No. Time Source Destination Protocol Info
14 3.015112 10.133.1.123 10.133.1.49 TCP 9102 >
35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0
Frame 14 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:13:c3:75:19:7b
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112),
Seq: 1, Ack: 4239824515, Len: 0
Source port: 9102 (9102)
Destination port: 35112 (35112)
Sequence number: 1 (relative sequence number)
Header length: 20 bytes
Flags: 0x0004 (RST)
Window size: 0
Checksum: 0x6777 (correct)
SEQ/ACK analysis
No. Time Source Destination Protocol Info
15 6.230331 10.133.1.49 10.133.1.123 TCP [TCP
Out-Of-Order] 35112 > 9102 [PSH, ACK] Seq=1 Ack=1 Win=5840 Len=4 TSV=3528875973
TSER=0
Frame 15 (70 bytes on wire, 70 bytes captured)
Ethernet II, Src: 00:11:43:37:83:92, Dst: 00:14:22:19:ec:82
Internet Protocol, Src Addr: 10.133.1.49 (10.133.1.49), Dst Addr: 10.133.1.123
(10.133.1.123)
Transmission Control Protocol, Src Port: 35112 (35112), Dst Port: 9102 (9102),
Seq: 1, Ack: 1, Len: 4
Source port: 35112 (35112)
Destination port: 9102 (9102)
Sequence number: 1 (relative sequence number)
Next sequence number: 5 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 32 bytes
Flags: 0x0018 (PSH, ACK)
Window size: 5840
Checksum: 0x7876 (correct)
Options: (12 bytes)
SEQ/ACK analysis
TCP Analysis Flags
This frame is a (suspected) out-of-order segment
Data (4 bytes)
0000 00 00 00 1e ....
No. Time Source Destination Protocol Info
16 6.230356 10.133.1.123 10.133.1.49 TCP 9102 >
35112 [RST] Seq=1 Ack=4239824515 Win=0 Len=0
Frame 16 (54 bytes on wire, 54 bytes captured)
Ethernet II, Src: 00:14:22:19:ec:82, Dst: 00:11:43:37:83:92
Internet Protocol, Src Addr: 10.133.1.123 (10.133.1.123), Dst Addr: 10.133.1.49
(10.133.1.49)
Transmission Control Protocol, Src Port: 9102 (9102), Dst Port: 35112 (35112),
Seq: 1, Ack: 4239824515, Len: 0
Source port: 9102 (9102)
Destination port: 35112 (35112)
Sequence number: 1 (relative sequence number)
Header length: 20 bytes
Flags: 0x0004 (RST)
Window size: 0
Checksum: 0x6777 (correct)
SEQ/ACK analysis
Arno Lehmann <[EMAIL PROTECTED]> 05/05/06 10:58 >>>
Hello,
On 5/5/2006 12:42 PM, Chris Boyd wrote:
Arno Lehmann <[EMAIL PROTECTED]> 05/04/06 6:59 >>>
Hello,
On 5/4/2006 4:38 PM, Chris Boyd wrote:
I'm running winbacula-1.38.8 on a win2003 server. The director is 1.36.3
Not a good idea, but that's fixed, I suppose.
Why not a good idea?
Because, AFAIK, 1.38 is not proven to be compatible with 1.36. Note that
I had that combination runnin for some time, too, and didn't see any
problems, but then I didn't check all features.
From the release notes:
Major Changes in 1.38:
...
- The Director, Storage daemon, and File daemons are
Deamons are not compatible with prior versions.
All FDs must be upgraded at the same time.
on a SuSE SLES 9.0. It keeps failing to connect with the usual error message.
However I can ping the win server and telnet to port 9102. I restart the daemon on both ends and it still keeps loosing connection. I tried setting the administrator logon in the File Daemon and updating the FD (to 1.38.8).
It's the only server I'm having this problem with...so I'm not sure what the problem might be.
Firewall in between?
Ah sorry I forgot to mention that. No firewall, both hosts on the LAN behind firewall.
Host access?
??
I qoute from my /etc/hosts.allow:
# See `man tcpd and `man 5 hosts_access for a detailed description
# of /etc/hosts.allow and /etc/hosts.deny.
Passwords don't match?
It sometimes makes a connx.
Ah... sometimes. Difficult beast. Have you tried observing the network
traffic using, for example, tcpdump or ethereal?
Or do other services suffer similar problems?
Arno
Did you try connecting from the FD to the SD? Being able to telnet _to_
the win server is not enough, the FD initiates the connection to the SD.
Sometimes it does and sometimes it doesn't.
Arno
-----------------------------------------------------------------
This email message is intended only for the addressee(s)
and contains information that may be confidential and/or
copyrighted. If you are not the intended recipient please
notify the sender by reply email and immediately delete
this email. Use, disclosure or reproduction of this email
by anyone other than the intended recipient(s) is strictly
prohibited. USIT has scanned this email for viruses and
dangerous content and believes it to be clean. However,
virus scanning is ultimately the responsibility of the recipient.
-----------------------------------------------------------------
-------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=k&kid0709&bid&3057&dat1642
_______________________________________________
Bacula-users mailing list
Bacula-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-users