So this is interesting.... I did a pkt capture with tshark while a 'guix pull' 
was running and captured RST packets for the TLS connection:
1 0.000000000    <redacted>           185.233.100.56        SSL      2804   
Continuation Data

2 0.000047880    <redacted>           185.233.100.56        SSL      2804   
Continuation Data

3 0.355735909    185.233.100.56        <redacted>           TCP      62     443 
→ 53526 [RST] Seq=1 Win=0 Len=0

4 0.355891353    185.233.100.56        <redacted>           TCP      62     443 
→ 53526 [RST] Seq=1 Win=0 Len=0

5 0.355891393    185.233.100.56        <redacted>           TCP      62     443 
→ 53526 [RST] Seq=1 Win=0 Len=0

6 0.355939644    185.233.100.56        <redacted>           TCP      62     443 
→ 53526 [RST] Seq=1 Win=0 Len=0

7 0.356476147    185.233.100.56        <redacted>           TCP      62     443 
→ 53526 [RST] Seq=1 Win=0 Len=0

8 0.356476197    185.233.100.56        <redacted>           TCP      62     443 
→ 53526 [RST] Seq=1 Win=0 Len=0

Now, is that RST coming from an intermediate device (ex: my firewall) or 
directly from the sub server? Not sure but I will inspect firewall logs and its 
interesting that its only the one host exhibiting this behavior. FWIW, no 
host-based firewall or IPS/IDS in play here.

Reply via email to