TIP: Click on subject to list as thread! ANSI
echo: rberrypi
to: ALL
from: ADRIAN
date: 2020-06-13 16:12:00
subject: Re: rsync oddity

New SD card with Buster installed, and things set up.

Early this morning, the first rsync session ran, and failed in the usual
way.

I opened up sessions on the source (192.168.1.18) and target
(192.168.1.118) machines, and started tcpdump running on both.  I then
ran the rsync script on the source machine.

 From the source machine :

No.     Time    Source  Destination     Protocol        Length  Info
43      8.398245        192.168.1.18    192.168.1.118   TCP     74 49878
? 22 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 SACK_PERM=1 TSval=2778656323
TSecr=0 WS=128
44      8.399106        192.168.1.118   192.168.1.18    TCP     74 22 ?
49878 [SYN, ACK] Seq=0 Ack=1 Win=65160 Len=0 MSS=1460 SACK_PERM=1
TSval=371510247 TSecr=2778656323 WS=64
45      8.399173        192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1 Ack=1 Win=29312 Len=0 TSval=2778656324 TSecr=371510247
46      8.402167        192.168.1.18    192.168.1.118   SSHv2   108
Client: Protocol (SSH-2.0-OpenSSH_7.4p1 Raspbian-10+deb9u7)
47      8.403659        192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=1 Ack=43 Win=65152 Len=0 TSval=371510251
TSecr=2778656327
48      8.543644        192.168.1.118   192.168.1.18    SSHv2   109
Server: Protocol (SSH-2.0-OpenSSH_7.9p1 Raspbian-10+deb10u2)
49      8.543673        192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=43 Ack=44 Win=29312 Len=0 TSval=2778656468
TSecr=371510391
50      8.560096        192.168.1.118   192.168.1.18    SSHv2   1146
Server: Key Exchange Init
51      8.560132        192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=43 Ack=1124 Win=32128 Len=0 TSval=2778656485
TSecr=371510407
52      8.560386        192.168.1.18    192.168.1.118   SSHv2   1498
Client: Key Exchange Init
53      8.561376        192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=1124 Ack=1475 Win=64064 Len=0 TSval=371510409
TSecr=2778656485
54      8.590538        192.168.1.18    192.168.1.118   SSHv2   114
Client: Diffie-Hellman Key Exchange Init
55      8.591343        192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=1124 Ack=1523 Win=64064 Len=0 TSval=371510439
TSecr=2778656515
56      8.676005        192.168.1.118   192.168.1.18    SSHv2   518
Server: Diffie-Hellman Key Exchange Reply, New Keys, Encrypted packet
(len=172)
57      8.720500        192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1523 Ack=1576 Win=35072 Len=0 TSval=2778656645
TSecr=371510524
58      8.755476        192.168.1.18    192.168.1.118   SSHv2   82
Client: New Keys
59      8.756247        192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=1576 Ack=1539 Win=64128 Len=0 TSval=371510604
TSecr=2778656680
60      8.756274        192.168.1.18    192.168.1.118   SSHv2   110
Client: Encrypted packet (len=44)
61      8.756969        192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=1576 Ack=1583 Win=64128 Len=0 TSval=371510605
TSecr=2778656681
62      8.757556        192.168.1.118   192.168.1.18    SSHv2   110
Server: Encrypted packet (len=44)
63      8.757566        192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1583 Ack=1620 Win=35072 Len=0 TSval=2778656682
TSecr=371510605
64      8.757620        192.168.1.18    192.168.1.118   SSHv2   126
Client: Encrypted packet (len=60)
65      8.775365        192.168.1.118   192.168.1.18    SSHv2   118
Server: Encrypted packet (len=52)
66      8.775451        192.168.1.18    192.168.1.118   SSHv2   438
Client: Encrypted packet (len=372)
67      8.807598        192.168.1.118   192.168.1.18    SSHv2   398
Server: Encrypted packet (len=332)
68      8.834753        192.168.1.18    192.168.1.118   SSHv2   718
Client: Encrypted packet (len=652)
69      8.883209        192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=2004 Ack=2667 Win=64128 Len=0 TSval=371510731
TSecr=2778656759
70      8.884909        192.168.1.118   192.168.1.18    SSHv2   94
Server: Encrypted packet (len=28)
71      8.885140        192.168.1.18    192.168.1.118   SSHv2   178
Client: Encrypted packet (len=112)
72      8.885956        192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=2032 Ack=2779 Win=64064 Len=0 TSval=371510734
TSecr=2778656810
73      11.524351       192.168.1.118   192.168.1.18    SSHv2   706
Server: Encrypted packet (len=640)
74      11.570505       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=2779 Ack=2672 Win=40832 Len=0 TSval=2778659495
TSecr=371513372
75      11.571469       192.168.1.118   192.168.1.18    SSHv2   250
Server: Encrypted packet (len=184)



1058    48.762330       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21116 Ack=1668835 Win=333952 Len=0 TSval=371550610
TSecr=2778696684
1059    48.762399       192.168.1.18    192.168.1.118   SSHv2   13098
Client: Encrypted packet (len=13032)
1060    48.762430       192.168.1.18    192.168.1.118   SSHv2   930
Client: Encrypted packet (len=864)
1061    48.764914       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21116 Ack=1682731 Win=333952 Len=0 TSval=371550613
TSecr=2778696687
1062    49.225837       192.168.1.118   192.168.1.18    SSHv2   230
Server: Encrypted packet (len=164)
1063    49.225911       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1682731 Ack=21280 Win=149376 Len=0 TSval=2778697151
TSecr=371551074
1064    49.340819       192.168.1.18    192.168.1.118   SSHv2   7306
Client: Encrypted packet (len=7240)
1065    49.340871       192.168.1.18    192.168.1.118   SSHv2   7306
Client: Encrypted packet (len=7240)
1066    49.343526       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21280 Ack=1697211 Win=333952 Len=0 TSval=371551191
TSecr=2778697266
1067    49.343562       192.168.1.18    192.168.1.118   SSHv2   11978
Client: Encrypted packet (len=11912)
1068    49.345727       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21280 Ack=1709123 Win=333952 Len=0 TSval=371551194
TSecr=2778697269
1069    49.811906       192.168.1.118   192.168.1.18    SSHv2   214
Server: Encrypted packet (len=148)
1070    49.811955       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1709123 Ack=21428 Win=152320 Len=0 TSval=2778697737
TSecr=371551660
1071    49.936778       192.168.1.18    192.168.1.118   SSHv2   7306
Client: Encrypted packet (len=7240)
1072    49.936830       192.168.1.18    192.168.1.118   SSHv2   7306
Client: Encrypted packet (len=7240)
1073    49.939436       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21428 Ack=1723603 Win=333952 Len=0 TSval=371551787
TSecr=2778697862
1074    49.939474       192.168.1.18    192.168.1.118   SSHv2   13098
Client: Encrypted packet (len=13032)
1075    49.939488       192.168.1.18    192.168.1.118   SSHv2   298
Client: Encrypted packet (len=232)
1076    49.941737       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21428 Ack=1736867 Win=333952 Len=0 TSval=371551790
TSecr=2778697864
1077    50.493080       192.168.1.118   192.168.1.18    SSHv2   262
Server: Encrypted packet (len=196)
1078    50.493146       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1736867 Ack=21624 Win=155264 Len=0 TSval=2778698418
TSecr=371552341
1079    50.631121       192.168.1.18    192.168.1.118   SSHv2   7306
Client: Encrypted packet (len=7240)
1080    50.631183       192.168.1.18    192.168.1.118   SSHv2   7306
Client: Encrypted packet (len=7240)
1081    50.633815       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21624 Ack=1751347 Win=333952 Len=0 TSval=371552482
TSecr=2778698556
1082    50.633850       192.168.1.18    192.168.1.118   SSHv2   11282
Client: Encrypted packet (len=11216)
1083    50.636052       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21624 Ack=1762563 Win=333952 Len=0 TSval=371552484
TSecr=2778698559
1084    50.643400       192.168.1.118   192.168.1.18    SSHv2   102
Server: Encrypted packet (len=36)
1085    50.643435       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1762563 Ack=21660 Win=155264 Len=0 TSval=2778698568
TSecr=371552491
1086    51.105434       192.168.1.118   192.168.1.18    SSHv2   222
Server: Encrypted packet (len=156)
1087    51.105483       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1762563 Ack=21816 Win=158080 Len=0 TSval=2778699030
TSecr=371552953
1088    51.251912       192.168.1.18    192.168.1.118   SSHv2   7306
Client: Encrypted packet (len=7240)
1089    51.251985       192.168.1.18    192.168.1.118   SSHv2   7306
Client: Encrypted packet (len=7240)
1090    51.254561       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21816 Ack=1777043 Win=333952 Len=0 TSval=371553102
TSecr=2778699177
1091    51.254647       192.168.1.18    192.168.1.118   SSHv2   13098
Client: Encrypted packet (len=13032)
1092    51.254679       192.168.1.18    192.168.1.118   SSHv2   13098
Client: Encrypted packet (len=13032)

 From the target machine :

No.     Time    Source  Destination     Protocol        Length  Info
15      24.212488       192.168.1.18    192.168.1.118   TCP     74 49878
? 22 [SYN] Seq=0 Win=29200 Len=0 MSS=1460 SACK_PERM=1 TSval=2778656323
TSecr=0 WS=128
16      24.212715       192.168.1.118   192.168.1.18    TCP     74 22 ?
49878 [SYN, ACK] Seq=0 Ack=1 Win=65160 Len=0 MSS=1460 SACK_PERM=1
TSval=371510247 TSecr=2778656323 WS=64
17      24.213350       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1 Ack=1 Win=29312 Len=0 TSval=2778656324 TSecr=371510247
18      24.216573       192.168.1.18    192.168.1.118   SSHv2   108
Client: Protocol (SSH-2.0-OpenSSH_7.4p1 Raspbian-10+deb9u7)
19      24.216792       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=1 Ack=43 Win=65152 Len=0 TSval=371510251
TSecr=2778656327
20      24.357175       192.168.1.118   192.168.1.18    SSHv2   109
Server: Protocol (SSH-2.0-OpenSSH_7.9p1 Raspbian-10+deb10u2)
21      24.357911       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=43 Ack=44 Win=29312 Len=0 TSval=2778656468
TSecr=371510391
22      24.373383       192.168.1.118   192.168.1.18    SSHv2   1146
Server: Key Exchange Init
23      24.374385       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=43 Ack=1124 Win=32128 Len=0 TSval=2778656485
TSecr=371510407
24      24.374888       192.168.1.18    192.168.1.118   SSHv2   1498
Client: Key Exchange Init
25      24.374992       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=1124 Ack=1475 Win=64064 Len=0 TSval=371510409
TSecr=2778656485
26      24.404787       192.168.1.18    192.168.1.118   SSHv2   114
Client: Diffie-Hellman Key Exchange Init
27      24.404913       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=1124 Ack=1523 Win=64064 Len=0 TSval=371510439
TSecr=2778656515
28      24.489446       192.168.1.118   192.168.1.18    SSHv2   518
Server: Diffie-Hellman Key Exchange Reply, New Keys, Encrypted packet
(len=172)
29      24.534774       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1523 Ack=1576 Win=35072 Len=0 TSval=2778656645
TSecr=371510524
30      24.569707       192.168.1.18    192.168.1.118   SSHv2   82
Client: New Keys
31      24.569842       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=1576 Ack=1539 Win=64128 Len=0 TSval=371510604
TSecr=2778656680
32      24.570495       192.168.1.18    192.168.1.118   SSHv2   110
Client: Encrypted packet (len=44)
33      24.570605       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=1576 Ack=1583 Win=64128 Len=0 TSval=371510605
TSecr=2778656681
34      24.571174       192.168.1.118   192.168.1.18    SSHv2   110
Server: Encrypted packet (len=44)
35      24.571759       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1583 Ack=1620 Win=35072 Len=0 TSval=2778656682
TSecr=371510605
36      24.571848       192.168.1.18    192.168.1.118   SSHv2   126
Client: Encrypted packet (len=60)
37      24.588933       192.168.1.118   192.168.1.18    SSHv2   118
Server: Encrypted packet (len=52)
38      24.589777       192.168.1.18    192.168.1.118   SSHv2   438
Client: Encrypted packet (len=372)
39      24.621096       192.168.1.118   192.168.1.18    SSHv2   398
Server: Encrypted packet (len=332)
40      24.649108       192.168.1.18    192.168.1.118   SSHv2   718
Client: Encrypted packet (len=652)
41      24.696698       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=2004 Ack=2667 Win=64128 Len=0 TSval=371510731
TSecr=2778656759
42      24.698496       192.168.1.118   192.168.1.18    SSHv2   94
Server: Encrypted packet (len=28)
43      24.699429       192.168.1.18    192.168.1.118   SSHv2   178
Client: Encrypted packet (len=112)
44      24.699599       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=2032 Ack=2779 Win=64064 Len=0 TSval=371510734
TSecr=2778656810
45      27.337691       192.168.1.118   192.168.1.18    SSHv2   706
Server: Encrypted packet (len=640)
46      27.384800       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=2779 Ack=2672 Win=40832 Len=0 TSval=2778659495
TSecr=371513372
47      27.385000       192.168.1.118   192.168.1.18    SSHv2   250
Server: Encrypted packet (len=184)
48      27.385687       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=2779 Ack=2856 Win=43008 Len=0 TSval=2778659496
TSecr=371513419
49      27.386030       192.168.1.18    192.168.1.118   SSHv2   258
Client: Encrypted packet (len=192)
50      27.386125       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=2856 Ack=2971 Win=64064 Len=0 TSval=371513420
TSecr=2778659497
51      27.389792       192.168.1.118   192.168.1.18    SSHv2   138
Server: Encrypted packet (len=72)
52      27.390666       192.168.1.18    192.168.1.118   SSHv2   110
Client: Encrypted packet (len=44)
53      27.436788       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=2928 Ack=3015 Win=64128 Len=0 TSval=371513471
TSecr=2778659501
54      27.492527       192.168.1.118   192.168.1.18    SSHv2   110
Server: Encrypted packet (len=44)



1981    66.446888       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1982    66.446954       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1983    66.446996       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1984    66.447036       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1985    66.447078       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1986    66.447429       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21624 Ack=1751347 Win=333952 Len=0 TSval=371552482
TSecr=2778698556
1987    66.448521       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1988    66.448677       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1989    66.449083       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1990    66.449200       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1991    66.449253       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1992    66.449293       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1993    66.449330       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
1994    66.449421       192.168.1.18    192.168.1.118   SSHv2   1146
Client: Encrypted packet (len=1080)
1995    66.449714       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21624 Ack=1762563 Win=333952 Len=0 TSval=371552484
TSecr=2778698559
1996    66.457005       192.168.1.118   192.168.1.18    SSHv2   102
Server: Encrypted packet (len=36)
1997    66.457715       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1762563 Ack=21660 Win=155264 Len=0 TSval=2778698568
TSecr=371552491
1998    66.918954       192.168.1.118   192.168.1.18    SSHv2   222
Server: Encrypted packet (len=156)
1999    66.919883       192.168.1.18    192.168.1.118   TCP     66 49878
? 22 [ACK] Seq=1762563 Ack=21816 Win=158080 Len=0 TSval=2778699030
TSecr=371552953
2000    67.066461       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
2001    67.066948       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
2002    67.067082       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
2003    67.067185       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
2004    67.067279       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
2005    67.067504       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
2006    67.067565       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
2007    67.067668       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
2008    67.067718       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
2009    67.067819       192.168.1.18    192.168.1.118   SSHv2   1514
Client: Encrypted packet (len=1448)
2010    67.068146       192.168.1.118   192.168.1.18    TCP     66 22 ?
49878 [ACK] Seq=21816 Ack=1777043 Win=333952 Len=0 TSval=371553102
TSecr=2778699177
564216  7427.756675     192.168.1.118   192.168.1.18    TCP     66 [TCP
Keep-Alive] 22 ? 49878 [ACK] Seq=21815 Ack=1777043 Win=333952 Len=0
TSval=378913834 TSecr=2778699177
564217  7427.757541     192.168.1.18    192.168.1.118   TCP     60 49878
? 22 [RST] Seq=1777043 Win=0 Len=0

Note the big leap between packets 2010 and 564216 when there was no
traffic between the two machines.

Apart from the last two packets on the target, the two sessions seem to
run for about the same time on both machines.

Adrian
--
To Reply :
replace "bulleid" with "adrian" - all mail to bulleid is rejected
Sorry for the rigmarole, If I want spam, I'll go to the shops
Every time someone says "I don't believe in trolls", another one dies.

--- SoupGate-Win32 v1.05
* Origin: Agency HUB, Dunedin - New Zealand | FidoUsenet Gateway (3:770/3)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.