我的家庭网络中有三台 Windows 10 机器,一台台式机(LAN)和两台笔记本电脑(WLAN)。我试图访问某个网站(belastingdienst.nl,荷兰税务机构网站)。结果(一致,这些不是侥幸):
桌面:
-Brave 浏览器(基于 Chromium):ERR_CONNECTION_RESET
-Internet Explorer:ERR_CONNECTION_RESET
-Firefox:运行良好
-Internet Explorer:运行良好
笔记本电脑 1:
-Brave 浏览器:运行良好
-Internet Explorer:运行良好
-Chromium:ERR_CONNECTION_RESET(当我通过 VPN 连接到我的办公室网络时,它运行良好)
笔记本电脑 2:
-Brave 浏览器:ERR_CONNECTION_RESET
-Internet Explorer:运行良好
这些结果让我困惑。我做了一些记录桌面使用 Wireshark 检查机器,发现远程机器发送了一个重置包:
192.168.xxx.xx 85.159.98.33 TCP 66 62457 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM=1
85.159.98.33 192.168.xxx.xx TCP 62 443 → 62457 [SYN, ACK] Seq=0 Ack=1 Win=4260 Len=0 MSS=1420 SACK_PERM=1
192.168.xxx.xx 85.159.98.33 TCP 54 62457 → 443 [ACK] Seq=1 Ack=1 Win=64240 Len=0
192.168.xxx.xx 85.159.98.33 TLSv1.2 571 Client Hello
85.159.98.33 192.168.xxx.xx TCP 60 443 → 62457 [ACK] Seq=1 Ack=518 Win=4777 Len=0
85.159.98.33 192.168.xxx.xx TLSv1.2 1474 Server Hello
85.159.98.33 192.168.xxx.xx TCP 1474 443 → 62457 [ACK] Seq=1421 Ack=518 Win=4777 Len=1420 [TCP segment of a reassembled PDU]
85.159.98.33 192.168.xxx.xx TCP 1474 443 → 62457 [ACK] Seq=2841 Ack=518 Win=4777 Len=1420 [TCP segment of a reassembled PDU]
85.159.98.33 192.168.xxx.xx TCP 1474 443 → 62457 [ACK] Seq=4261 Ack=518 Win=4777 Len=1420 [TCP segment of a reassembled PDU]
85.159.98.33 192.168.xxx.xx TLSv1.2 657 Certificate, Server Key Exchange, Server Hello Done
192.168.xxx.xx 85.159.98.33 TCP 54 62457 → 443 [ACK] Seq=518 Ack=6284 Win=65320 Len=0
192.168.xxx.xx 85.159.98.33 TLSv1.2 180 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
85.159.98.33 192.168.xxx.xx TCP 60 443 → 62457 [ACK] Seq=6284 Ack=644 Win=4903 Len=0
85.159.98.33 192.168.xxx.xx TLSv1.2 60 Change Cipher Spec
85.159.98.33 192.168.xxx.xx TLSv1.2 99 Encrypted Handshake Message
192.168.xxx.xx 85.159.98.33 TCP 54 62457 → 443 [ACK] Seq=644 Ack=6335 Win=65269 Len=0
192.168.xxx.xx 85.159.98.33 TLSv1.2 1072 Application Data
85.159.98.33 192.168.xxx.xx TCP 60 443 → 62457 [ACK] Seq=6335 Ack=1662 Win=5921 Len=0
85.159.98.33 192.168.xxx.xx TCP 60 443 → 62457 [RST, ACK] Seq=6335 Ack=1662 Win=0 Len=0
我还在工作浏览器上进行了一些日志记录。我的机器在发送应用程序数据之前,会向远程机器发送一条额外的“更改密码规范,加密握手消息”消息。
问题似乎是由于远程机器希望收到额外的 TLS“协商”包,而在缺少该包的情况下,它会发回一个重置包。
更奇怪的是笔记本电脑 2,我实际上在 Wireshark 中看到了一个 HTTP 302 错误,然后是一个重置包(根本没有 TLS 包/尝试握手):
192.168.xxx.xx 85.159.98.33 TCP 66 58207 → 80 [SYN] Seq=0 Win=64952 Len=0 MSS=1460 WS=256 SACK_PERM=1
85.159.98.33 192.168.xxx.xx TCP 62 80 → 58207 [SYN, ACK] Seq=0 Ack=1 Win=4260 Len=0 MSS=1420 SACK_PERM=1
192.168.xxx.xx 85.159.98.33 TCP 54 58207 → 80 [ACK] Seq=1 Ack=1 Win=64952 Len=0
192.168.xxx.xx 85.159.98.33 HTTP 507 GET / HTTP/1.1
85.159.98.33 192.168.xxx.xx HTTP 189 HTTP/1.0 302 Moved Temporarily
85.159.98.33 192.168.xxx.xx TCP 56 80 → 58207 [RST, ACK] Seq=136 Ack=454 Win=0 Len=0
我觉得这很奇怪。我该如何修复或进一步诊断问题?是什么导致了这种行为?这种情况发生在三台独立的机器上,但只有连接到我的家庭网络时才会发生,这使得这个问题变得有些神秘。