TCP Handshake unexpected behaviour
pcapng: https://drive.google.com/file/d/19H6-...
Hi, I am very new to learning about networking (studying my first university unit at the moment) and I am getting some unexpected results when trying to identify TCP and TLS handshaking frames. What I expected to see was TCP SYN->SYN ACK->ACK to TLS ClientHello->ServerHello->KeyExchange->FIN.
What I got was: Duplicate TCP handshake on incremented ports, Malformed packet, TCP ACKed unseen segment, Dup ACK, Previous segment not captured.
I have had trouble trying to find information on troubleshooting, likely due to my inexperience. My tutors couldn't explain what was causing the errors either.
Would really appreciate any insight into what's going on. Thankyou!
edit: To add I have tried multiple browsers(chrome+firefox), reinstalled Wireshark(using v4.4.0), flushed dns.
No. Time Source Destination Protocol Length Info
1 0.000000 2001:8003:5133:6700:4582:92cd:d481:6143 2606:2800:21f:cb07:6820:80da:af6b:8b2c TCP 86 63223 → 443 [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM
Frame 1: 86 bytes on wire (688 bits), 86 bytes captured (688 bits) on interface \Device\NPF_{9412F1C9-F358-417B-89CD-BC6023496F29}, id 0
Ethernet II, Src: MicroStarINT_56:34:d2 (2c:f0:5d:56:34:d2), Dst: TechnicolorD_a8:36:04 (d4:35:1d:a8:36:04)
Internet Protocol Version 6, Src: 2001:8003:5133:6700:4582:92cd:d481:6143, Dst: 2606:2800:21f:cb07:6820:80da:af6b:8b2c
Transmission Control Protocol, Src Port: 63223, Dst Port: 443, Seq: 0, Len: 0
No. Time Source Destination Protocol Length Info
2 0.000173 2001:8003:5133:6700:4582:92cd:d481:6143 2606:2800:21f:cb07:6820:80da:af6b:8b2c TCP 86 63224 → 443 [SYN] Seq=0 Win=64800 Len=0 MSS=1440 WS=256 SACK_PERM
Frame 2: 86 bytes on wire (688 bits), 86 bytes captured (688 bits) on interface \Device\NPF_{9412F1C9-F358-417B-89CD-BC6023496F29}, id 0
Ethernet II, Src: MicroStarINT_56:34:d2 (2c:f0:5d:56:34:d2), Dst: TechnicolorD_a8:36:04 (d4:35:1d:a8:36:04)
Internet Protocol Version 6, Src: 2001:8003:5133:6700:4582:92cd:d481:6143, Dst: 2606:2800:21f:cb07:6820:80da:af6b:8b2c
Transmission Control Protocol, Src Port: 63224, Dst Port: 443, Seq: 0, Len: 0
No. Time Source Destination Protocol Length Info
3 0.159008 2606:2800:21f:cb07:6820:80da:af6b:8b2c 2001:8003:5133:6700:4582:92cd:d481:6143 TCP 86 443 → 63224 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1220 SACK_PERM WS=512
Frame 3: 86 bytes on wire (688 bits), 86 bytes captured (688 bits) on interface \Device\NPF_{9412F1C9-F358-417B-89CD-BC6023496F29}, id 0
Ethernet II, Src: TechnicolorD_a8:36:04 (d4:35:1d:a8:36:04), Dst: MicroStarINT_56:34:d2 (2c:f0:5d:56:34:d2)
Internet Protocol Version 6, Src: 2606:2800:21f:cb07:6820:80da:af6b:8b2c, Dst: 2001:8003:5133:6700:4582:92cd:d481:6143
Transmission Control Protocol, Src Port: 443, Dst Port: 63224, Seq: 0, Ack: 1, Len: 0
No. Time Source Destination Protocol Length Info
4 ...
How is the capture being made? Please provide details on client, internet access network technology being used, topology.
I can see the Malformed packet frames exceed the MSS agreed upon in the TCP handshake(packet list pane shows malformed packet length 2098, MSS 1220 ACK), Wireshark hints at 'TCP segmentation offload' in the details pane with payload length = 0. I'm trying to learn what this means.
How is the capture being made? Please provide details on client, internet access network technology being used, topology.
Windows 10 PC capturing on ethernet adapter, Wireshark v4.4.0 - display filter "ipv6.addr == 2606:2800:21f:cb07:6820:80da:af6b:8b2c", direct ethernet to Technicolor DJA0231 router LAN port, gateway and DNS managed by ISP Telstra Bigpond.
Traffic generated from Google Chrome Version 128.0.6613.115 entering example.com into address bar.
Please let me know if there's any further information needed.
Great info, helps a lot. And Sake nailed it, again :)