192.168.001.100 : ip of eth1 on the pi (part of the dongle)
192.168.001.001 : ip of the web service of the dongle
010.000.001.025 : ip of the wired eth0 of the pi
010.000.001.024 : computer trying to access 10.1.1.25:8080 through browser
Something is clearly passed to the right place. To my untrained eye it seems the return packets aren't being routed back to the computer requesting them but rather getting stuck in the pi. Am I onto something here perhaps?
part of eth1.pcap showing activity to port 192.168.1.1:80 from the pi's eth1
Code: Select all
06:32:18.782948 IP 192.168.1.100.53239 > 192.168.1.1.http: Flags [S], seq 3561714, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 1290800088 ecr 0,sackOK,eol], length 0
06:32:18.784085 IP 192.168.1.1.http > 192.168.1.100.53239: Flags [S.], seq 1268537831, ack 3561715, win 5792, options [mss 1460,sackOK,TS val 3812649 ecr 1290800088,nop,wscale 1], length 0
06:32:18.793794 IP 192.168.1.100.53239 > 192.168.1.1.http: Flags [.], ack 1, win 8235, options [nop,nop,TS val 1290800099 ecr 3812649], length 0
06:32:18.794460 IP 192.168.1.100.53239 > 192.168.1.1.http: Flags [P.], seq 1:327, ack 1, win 8235, options [nop,nop,TS val 1290800100 ecr 3812649], length 326
06:32:18.796711 IP 192.168.1.1.http > 192.168.1.100.53239: Flags [.], ack 327, win 3432, options [nop,nop,TS val 3812650 ecr 1290800100], length 0
06:32:18.805464 IP 192.168.1.1.http > 192.168.1.100.53239: Flags [P.], seq 1:236, ack 327, win 3432, options [nop,nop,TS val 3812651 ecr 1290800100], length 235
06:32:18.807566 IP 192.168.1.1.http > 192.168.1.100.53239: Flags [P.], seq 236:249, ack 327, win 3432, options [nop,nop,TS val 3812651 ecr 1290800100], length 13
06:32:18.808608 IP 192.168.1.1.http > 192.168.1.100.53239: Flags [F.], seq 249, ack 327, win 3432, options [nop,nop,TS val 3812651 ecr 1290800100], length 0
06:32:18.808977 IP 192.168.1.100.53239 > 192.168.1.1.http: Flags [.], ack 236, win 8220, options [nop,nop,TS val 1290800112 ecr 3812651], length 0
06:32:18.824221 IP 192.168.1.100.53239 > 192.168.1.1.http: Flags [.], ack 249, win 8220, options [nop,nop,TS val 1290800128 ecr 3812651], length 0
06:32:18.825681 IP 192.168.1.100.53239 > 192.168.1.1.http: Flags [.], ack 250, win 8220, options [nop,nop,TS val 1290800128 ecr 3812651], length 0
06:32:18.827330 IP 192.168.1.100.53239 > 192.168.1.1.http: Flags [F.], seq 327, ack 250, win 8220, options [nop,nop,TS val 1290800128 ecr 3812651], length 0
06:32:18.828408 IP 192.168.1.1.http > 192.168.1.100.53239: Flags [.], ack 328, win 3432, options [nop,nop,TS val 3812653 ecr 1290800128], length 0
06:32:18.981469 IP 192.168.1.100.53241 > 192.168.1.1.http: Flags [S], seq 1481448211, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 1290800279 ecr 0,sackOK,eol], length 0
06:32:18.982937 IP 192.168.1.1.http > 192.168.1.100.53241: Flags [S.], seq 1282171617, ack 1481448212, win 5792, options [mss 1460,sackOK,TS val 3812669 ecr 1290800279,nop,wscale 1], length 0
part of eth0.pcap showing the request from my computer to the pi's eth0 10.0.1.25:8080
Code: Select all
06:28:20.802457 IP 10.0.1.24.53230 > 10.0.1.25.http-alt: Flags [S], seq 1944216816, win 65535, options [mss 1460,nop,wscale 4,nop,nop,TS val 1290569252 ecr 0,sackOK,eol], length 0
06:28:20.804731 IP 10.0.1.25.http-alt > 10.0.1.24.53230: Flags [S.], seq 1833179599, ack 1944216817, win 5792, options [mss 1460,sackOK,TS val 3788851 ecr 1290569252,nop,wscale 1], length 0
06:28:21.125626 IP 10.0.1.24.53230 > 10.0.1.25.http-alt: Flags [.], ack 1, win 8235, options [nop,nop,TS val 1290569461 ecr 3788851], length 0
06:28:21.125630 IP 10.0.1.24.53230 > 10.0.1.25.http-alt: Flags [P.], seq 1:327, ack 1, win 8235, options [nop,nop,TS val 1290569462 ecr 3788851], length 326
06:28:21.127432 IP 10.0.1.25.http-alt > 10.0.1.24.53230: Flags [.], ack 327, win 3432, options [nop,nop,TS val 3788883 ecr 1290569462], length 0
06:28:21.137155 IP 10.0.1.25.http-alt > 10.0.1.24.53230: Flags [P.], seq 1:236, ack 327, win 3432, options [nop,nop,TS val 3788884 ecr 1290569462], length 235
06:28:21.139234 IP 10.0.1.25.http-alt > 10.0.1.24.53230: Flags [P.], seq 236:249, ack 327, win 3432, options [nop,nop,TS val 3788884 ecr 1290569462], length 13
06:28:21.139676 IP 10.0.1.24.53230 > 10.0.1.25.http-alt: Flags [.], ack 236, win 8220, options [nop,nop,TS val 1290569585 ecr 3788884], length 0
06:28:21.140344 IP 10.0.1.25.http-alt > 10.0.1.24.53230: Flags [F.], seq 249, ack 327, win 3432, options [nop,nop,TS val 3788884 ecr 1290569462], length 0
06:28:21.154863 IP 10.0.1.24.53230 > 10.0.1.25.http-alt: Flags [.], ack 249, win 8220, options [nop,nop,TS val 1290569601 ecr 3788884], length 0
06:28:21.155779 IP 10.0.1.24.53230 > 10.0.1.25.http-alt: Flags [.], ack 250, win 8220, options [nop,nop,TS val 1290569601 ecr 3788884], length 0
06:28:21.156097 IP 10.0.1.24.53230 > 10.0.1.25.http-alt: Flags [F.], seq 327, ack 250, win 8220, options [nop,nop,TS val 1290569601 ecr 3788884], length 0
06:28:21.157332 IP 10.0.1.25.http-alt > 10.0.1.24.53230: Flags [.], ack 328, win 3432, options [nop,nop,TS val 3788886 ecr 1290569601], length 0