capture depuis le net (11.28)
http://nomdns:82
tcpdump -n port 80
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens192, link-type EN10MB (Ethernet), capture size 262144 bytes
13:01:56.113140 IP x.11.28.60802 > 192.168.66.101.80: Flags [S], seq 4265042360, win 16384, options [mss 1380,unknown-34 0x01000ac5fe8c], length 0
13:01:56.113212 IP 192.168.66.101.80 > x.11.28.60802: Flags [S.], seq 2098799210, ack 4265042361, win 29200, options [mss 1460], length 0
13:01:56.133978 IP x.11.28.60802 > 192.168.66.101.80: Flags [.], ack 1, win 16560, length 0
13:01:56.134002 IP x.11.28.60802 > 192.168.66.101.80: Flags [P.], seq 1:633, ack 1, win 16560, length 632: HTTP: GET / HTTP/1.0
13:01:56.134063 IP 192.168.66.101.80 > x.11.28.60802: Flags [.], ack 633, win 30336, length 0
13:01:56.135298 IP 192.168.66.101.80 > x.11.28.60802: Flags [.], seq 1:2761, ack 633, win 30336, length 2760: HTTP: HTTP/1.1 200 OK
13:01:56.135314 IP 192.168.66.101.80 > x.11.28.60802: Flags [P.], seq 2761:3526, ack 633, win 30336, length 765: HTTP
13:01:56.157674 IP x.11.28.60802 > 192.168.66.101.80: Flags [.], ack 3526, win 14415, length 0
13:01:56.207240 IP x.11.28.60802 > 192.168.66.101.80: Flags [P.], seq 633:1266, ack 3526, win 16560, length 633: HTTP: GET /icons/ubuntu-logo.png HTTP/1.0
13:01:56.207548 IP 192.168.66.101.80 > x.11.28.60802: Flags [.], seq 3526:6286, ack 1266, win 31650, length 2760: HTTP: HTTP/1.1 200 OK
13:01:56.207564 IP 192.168.66.101.80 > x.11.28.60802: Flags [P.], seq 6286:7149, ack 1266, win 31650, length 863: HTTP
13:01:56.230557 IP x.11.28.60802 > 192.168.66.101.80: Flags [.], ack 7149, win 14317, length 0
^C
12 packets captured
12 packets received by filter
0 packets dropped by kernel
capture depuis mon pc fixe 1.40 (en tapant la même chose à savoir
http://nomdns:82
tcpdump -n port 80
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens192, link-type EN10MB (Ethernet), capture size 262144 bytes
13:02:15.789179 IP 192.168.1.40.64807 > 192.168.66.101.80: Flags [S], seq 1571474878, win 8192, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0
13:02:15.789235 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [S.], seq 527361242, ack 1571474879, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
13:02:15.790052 IP 192.168.1.40.64807 > 192.168.66.101.80: Flags [.], ack 1, win 4106, length 0
13:02:15.790284 IP 192.168.1.40.64807 > 192.168.66.101.80: Flags [P.], seq 1:396, ack 1, win 4106, length 395: HTTP: GET / HTTP/1.1
13:02:15.790324 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [.], ack 396, win 237, length 0
13:02:15.791393 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [P.], seq 1:3526, ack 396, win 237, length 3525: HTTP: HTTP/1.1 200 OK
13:02:15.792151 IP 192.168.1.40.64807 > 192.168.66.101.80: Flags [.], ack 1, win 4106, options [nop,nop,sack 1 {2921:3526}], length 0
13:02:15.795808 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [.], seq 1:1461, ack 396, win 237, length 1460: HTTP: HTTP/1.1 200 OK
13:02:15.795827 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [.], seq 1461:2921, ack 396, win 237, length 1460: HTTP
13:02:15.999813 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [.], seq 1:1461, ack 396, win 237, length 1460: HTTP: HTTP/1.1 200 OK
13:02:16.407836 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [.], seq 1:1461, ack 396, win 237, length 1460: HTTP: HTTP/1.1 200 OK
13:02:17.223813 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [.], seq 1:1461, ack 396, win 237, length 1460: HTTP: HTTP/1.1 200 OK
13:02:18.859829 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [.], seq 1:1461, ack 396, win 237, length 1460: HTTP: HTTP/1.1 200 OK
13:02:20.796624 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [F.], seq 3526, ack 396, win 237, length 0
13:02:20.797249 IP 192.168.1.40.64807 > 192.168.66.101.80: Flags [.], ack 1, win 4106, options [nop,nop,sack 1 {2921:3526}], length 0
13:02:22.131884 IP 192.168.66.101.80 > 192.168.1.40.64807: Flags [.], seq 1:1461, ack 396, win 237, length 1460: HTTP: HTTP/1.1 200 OK
^C
et le détail des trames
13:03:04.366974 IP (tos 0x0, ttl 127, id 25174, offset 0, flags [DF], proto TCP (6), length 52)
192.168.1.40.64826 > 192.168.66.101.80: Flags [S], cksum 0x2109 (correct), seq 995504204, win 8192, options [mss 1460,nop,wscale 4,nop,nop,sackOK], length 0
13:03:04.367023 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
192.168.66.101.80 > 192.168.1.40.64826: Flags [S.], cksum 0xc504 (incorrect -> 0xeb9e), seq 4076138576, ack 995504205, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
13:03:04.367760 IP (tos 0x0, ttl 127, id 25175, offset 0, flags [none], proto TCP (6), length 40)
192.168.1.40.64826 > 192.168.66.101.80: Flags [.], cksum 0x8e77 (correct), ack 1, win 4106, length 0
13:03:04.368197 IP (tos 0x0, ttl 127, id 25176, offset 0, flags [none], proto TCP (6), length 435)
192.168.1.40.64826 > 192.168.66.101.80: Flags [P.], cksum 0x1d06 (correct), seq 1:396, ack 1, win 4106, length 395: HTTP, length: 395
GET / HTTP/1.1
Host: NOMDNS:82
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:47.0) Gecko/20100101 Firefox/47.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: ip_address_top_user_option=total_bytes; dashboard=["eth0.66","eth0"]
Connection: keep-alive
13:03:04.368228 IP (tos 0x0, ttl 64, id 20708, offset 0, flags [DF], proto TCP (6), length 40)
192.168.66.101.80 > 192.168.1.40.64826: Flags [.], cksum 0xc4f8 (incorrect -> 0x9c09), ack 396, win 237, length 0
effectivement tt les trames qui repartent du 66.x passent pas
c'est déjà un peu mieux faut que j'arrive à piger le truc des source nat rule (masquerade) et destination nat rule