https://bugs.kde.org/show_bug.cgi?id=371539

--- Comment #17 from kavra <kavra.ka...@gmail.com> ---
(In reply to Albert Vaca from comment #16)
> I don't think anything related to IP version has changed since 0.9... the
> biggest thing that differs between 0.9 and 1.0 is the kind of encryption
> used.
> 
> Can you post the "netstat -tulpen" output on both 1.0 and 0.9 to see if
> there is actually a difference? This way we will be sure it's a IPv6-related
> problem and not something related to the encryption like a cipher suites
> mismatch.
> 
> 
> Since I can't reproduce this issue, I will need your help guys to solve the
> problem :)

of course ;)

Version 0.9g:

(Not all processes could be identified, non-owned process info
 will not be shown, you would have to be root to see it all.)
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address         State      
PID/Program name   
tcp        0      0 127.0.0.1:631           0.0.0.0:*               LISTEN     
-                   
tcp        0      0 0.0.0.0:5900            0.0.0.0:*               LISTEN     
12602/krfb         
tcp6       0      0 ::1:631                 :::*                    LISTEN     
-                   
tcp6       0      0 :::5900                 :::*                    LISTEN     
12602/krfb         
tcp6       0      0 :::1714                 :::*                    LISTEN     
24925/kdeconnectd   
udp        0      0 0.0.0.0:68              0.0.0.0:*                          
-                   
udp6       0      0 :::47392                :::*                               
24925/kdeconnectd   
udp6       0      0 :::1714                 :::*                               
24925/kdeconnectd


Version 1.x

Proto Recv-Q Send-Q Local Address           Foreign Address         State      
PID/Program name   
tcp        0      0 localhost:ipp           0.0.0.0:*               LISTEN     
-                   
tcp        0      0 0.0.0.0:5900            0.0.0.0:*               LISTEN     
11182/krfb         
tcp6       0      0 [::]:1716               [::]:*                  LISTEN     
11031/kdeconnectd   
tcp6       0      0 localhost:ipp           [::]:*                  LISTEN     
-                   
tcp6       0      0 [::]:5900               [::]:*                  LISTEN     
11182/krfb         
udp        0      0 0.0.0.0:47934           0.0.0.0:*                          
-                   
udp        0      0 0.0.0.0:bootpc          0.0.0.0:*                          
-                   
udp        0      0 0.0.0.0:bootpc          0.0.0.0:*                          
-                   
udp6       0      0 [::]:1716               [::]:*                             
11031/kdeconnectd   
udp6       0      0 [::]:44685              [::]:*                             
-       

According to this thread and the one of gentoo that I follow in
parallel(https://forums.gentoo.org/viewtopic-p-7999976.html#7999976), the
problem happens with different models of telephone and operating system.

In the gentoo thread there are tcpdump outputs, in case they can help. Copy a
piece:

# tcpdump portrange 1716-1730 -vv
dropped privs to tcpdump
tcpdump: listening on enp5s0f2, link-type EN10MB (Ethernet), capture size
262144 bytes
19:03:57.222116 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto UDP
(17), length 854)
    192.168.0.2.43542 > 255.255.255.255.1716: [udp sum ok] UDP, length 826
19:03:57.222379 IP (tos 0x0, ttl 64, id 24029, offset 0, flags [DF], proto TCP
(6), length 60)
    192.168.0.50.34846 > 192.168.0.2.1716: Flags [S], cksum 0x9a35 (correct),
seq 3441841316, win 29200, options [mss 1460,sackOK,TS val 2034041 ecr
0,nop,wscale 7], length 0
19:03:57.223751 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6),
length 60)
    192.168.0.2.1716 > 192.168.0.50.34846: Flags [S.], cksum 0xf4a4 (correct),
seq 1635920093, ack 3441841317, win 65535, options [mss 1460,sackOK,TS val
8228018 ecr 2034041,nop,wscale 8], length 0
19:03:57.223791 IP (tos 0x0, ttl 64, id 24030, offset 0, flags [DF], proto TCP
(6), length 52)
    192.168.0.50.34846 > 192.168.0.2.1716: Flags [.], cksum 0x228b (correct),
seq 1, ack 1, win 229, options [nop,nop,TS val 2034043 ecr 8228018], length 0
19:03:57.224061 IP (tos 0x0, ttl 64, id 24031, offset 0, flags [DF], proto TCP
(6), length 1141)
    192.168.0.50.34846 > 192.168.0.2.1716: Flags [P.], cksum 0x0bf7 (correct),
seq 1:1090, ack 1, win 229, options [nop,nop,TS val 2034043 ecr 8228018],
length 1089
19:03:57.225568 IP (tos 0x0, ttl 64, id 42092, offset 0, flags [DF], proto TCP
(6), length 52)
    192.168.0.2.1716 > 192.168.0.50.34846: Flags [.], cksum 0x1dd3 (correct),
seq 1, ack 1090, win 348, options [nop,nop,TS val 8228018 ecr 2034043], length
0
19:03:57.343945 IP (tos 0x0, ttl 64, id 42093, offset 0, flags [DF], proto TCP
(6), length 128)
    192.168.0.2.1716 > 192.168.0.50.34846: Flags [P.], cksum 0x7240 (correct),
seq 1:77, ack 1090, win 348, options [nop,nop,TS val 8228030 ecr 2034043],
length 76
19:03:57.343982 IP (tos 0x0, ttl 64, id 24032, offset 0, flags [DF], proto TCP
(6), length 52)
    192.168.0.50.34846 > 192.168.0.2.1716: Flags [.], cksum 0x1d7a (correct),
seq 1090, ack 77, win 229, options [nop,nop,TS val 2034163 ecr 8228030], length
0
19:03:57.344135 IP (tos 0x0, ttl 64, id 24033, offset 0, flags [DF], proto TCP
(6), length 52)
    192.168.0.50.34846 > 192.168.0.2.1716: Flags [F.], cksum 0x1d79 (correct),
seq 1090, ack 77, win 229, options [nop,nop,TS val 2034163 ecr 8228030], length
0
19:03:57.345986 IP (tos 0x0, ttl 64, id 42094, offset 0, flags [DF], proto TCP
(6), length 52)
    192.168.0.2.1716 > 192.168.0.50.34846: Flags [F.], cksum 0x1d01 (correct),
seq 77, ack 1091, win 348, options [nop,nop,TS val 8228030 ecr 2034163], length
0
19:03:57.346030 IP (tos 0x0, ttl 64, id 24034, offset 0, flags [DF], proto TCP
(6), length 52)
    192.168.0.50.34846 > 192.168.0.2.1716: Flags [.], cksum 0x1d76 (correct),
seq 1091, ack 78, win 229, options [nop,nop,TS val 2034165 ecr 8228030], length
0 

Regards

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to