История изменений
Исправление LINUX-ORG-RU, (текущая версия) :
$ umame -a
No command umame found, did you mean:
Command uname in package coreutils
$ uname -a
Linux localhost 3.18.19+ #1 SMP PREEMPT Wed Apr 3 19:36:11 KST 2019 armv7l Android
$ openssl s_client -connect linux.org.ru:443
CONNECTED(00000003)
И всё висит, дальше ничего.
Я слыхал что какая то трабла с корневыми сертификатами была и старые дроиды типа 2,3 не могут половину интернета отрывать ибо в трабле замешан letsencrypt. Но у меня 6,0 андрюшка
$ termux-info
Packages CPU architecture:
arm
Subscribed repositories:
# sources.list
deb https://termux.net stable main
# game-repo (sources.list.d/game.list)
deb https://dl.bintray.com/grimler/game-packages-21 games stable
# science-repo (sources.list.d/science.list)
deb https://dl.bintray.com/grimler/science-packages-21 science stable
Updatable packages:
All packages up to date
Android version:
6.0
Kernel build information:
Linux localhost 3.18.19+ #1 SMP PREEMPT Wed Apr 3 19:36:11 KST 2019 armv7l Android
Device manufacturer:
LGE
Device model:
LG-K350
$
Вот что в tcpdump по wifi интерфейсу и адресу телефончика во время выполненияopenssl s_client -connect linux.org.ru:443
dron@gnu:~$ sudo tcpdump -i wlx6466b318bace host 10.42.0.233
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on wlx6466b318bace, link-type EN10MB (Ethernet), snapshot length 262144 bytes
20:12:01.896617 IP gnu.56520 > 10.42.0.233.8022: Flags [P.], seq 1405699504:1405699548, ack 2639997470, win 501, options [nop,nop,TS val 4178311266 ecr 24445794], length 44
20:12:02.000155 IP 10.42.0.233.8022 > gnu.56520: Flags [P.], seq 1:85, ack 44, win 407, options [nop,nop,TS val 24446144 ecr 4178311266], length 84
20:12:02.000211 IP gnu.56520 > 10.42.0.233.8022: Flags [.], ack 85, win 501, options [nop,nop,TS val 4178311369 ecr 24446144], length 0
20:12:02.178103 IP 10.42.0.233.45108 > 178.248.233.6.https: Flags [F.], seq 584274208, ack 1445175619, win 352, options [nop,nop,TS val 24446162 ecr 3641194222,nop,nop,sack 1 {2897:4184}], length 0
20:12:03.756012 IP gnu > 10.42.0.233: ICMP echo request, id 48015, seq 1, length 64
20:12:03.833659 IP 10.42.0.233 > gnu: ICMP echo reply, id 48015, seq 1, length 64
20:12:03.863380 IP 10.42.0.233.43036 > lq-in-f94.1e100.net.https: Flags [FP.], seq 1442454837:1442454868, ack 3252403628, win 399, options [nop,nop,TS val 24446218 ecr 1300489796], length 31
20:12:03.944535 IP gnu.56520 > 10.42.0.233.8022: Flags [P.], seq 44:80, ack 85, win 501, options [nop,nop,TS val 4178313314 ecr 24446144], length 36
20:12:03.947127 IP 10.42.0.233.8022 > gnu.56520: Flags [P.], seq 85:121, ack 80, win 407, options [nop,nop,TS val 24446226 ecr 4178313314], length 36
20:12:03.947181 IP gnu.56520 > 10.42.0.233.8022: Flags [.], ack 121, win 501, options [nop,nop,TS val 4178313316 ecr 24446226], length 0
20:12:04.887004 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [S], seq 4115025353, win 65535, options [mss 1460,sackOK,TS val 24446253 ecr 0,nop,wscale 8], length 0
20:12:04.896673 IP 178.248.233.6.https > 10.42.0.233.45109: Flags [S.], seq 238156078, ack 4115025354, win 5792, options [mss 1460,nop,wscale 9,sackOK,TS val 3641249083 ecr 24446253], length 0
20:12:04.897881 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [.], ack 1, win 343, options [nop,nop,TS val 24446256 ecr 3641249083], length 0
20:12:04.898104 IP 10.42.0.233.8022 > gnu.56520: Flags [P.], seq 121:181, ack 80, win 407, options [nop,nop,TS val 24446256 ecr 4178313316], length 60
20:12:04.898161 IP gnu.56520 > 10.42.0.233.8022: Flags [.], ack 181, win 501, options [nop,nop,TS val 4178314267 ecr 24446256], length 0
20:12:04.899229 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [P.], seq 1:315, ack 1, win 343, options [nop,nop,TS val 24446256 ecr 3641249083], length 314
20:12:05.902407 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [P.], seq 1:315, ack 1, win 343, options [nop,nop,TS val 24446279 ecr 3641249083], length 314
20:12:05.913286 IP 178.248.233.6.https > 10.42.0.233.45109: Flags [.], ack 315, win 60, options [nop,nop,TS val 3641250123 ecr 24446279,nop,nop,sack 1 {1:315}], length 0
20:12:08.759328 IP gnu > 10.42.0.233: ICMP echo request, id 39301, seq 1, length 64
20:12:08.953521 IP 10.42.0.233 > gnu: ICMP echo reply, id 39301, seq 1, length 64
20:12:09.907281 IP 178.248.233.6.https > 10.42.0.233.45109: Flags [F.], seq 4184, ack 315, win 60, options [nop,nop,TS val 3641254118 ecr 24446279], length 0
20:12:09.914847 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [.], ack 1, win 343, options [nop,nop,TS val 24446355 ecr 3641249083,nop,nop,sack 1 {4184:4185}], length 0
20:12:13.766003 IP gnu > 10.42.0.233: ICMP echo request, id 4897, seq 1, length 64
20:12:13.867988 IP 10.42.0.233 > gnu: ICMP echo reply, id 4897, seq 1, length 64
20:12:18.758371 IP gnu > 10.42.0.233: ICMP echo request, id 5151, seq 1, length 64
20:12:18.988841 IP 10.42.0.233 > gnu: ICMP echo reply, id 5151, seq 1, length 64
20:12:23.757116 IP gnu > 10.42.0.233: ICMP echo request, id 13910, seq 1, length 64
20:12:23.903611 IP 10.42.0.233 > gnu: ICMP echo reply, id 13910, seq 1, length 64
20:12:24.063844 IP 10.42.0.233.45108 > 178.248.233.6.https: Flags [F.], seq 0, ack 1, win 352, options [nop,nop,TS val 24446531 ecr 3641194222,nop,nop,sack 1 {2897:4184}], length 0
20:12:24.274316 IP 10.42.0.233.54869 > 203.247.157.116.47005: Flags [F.], seq 3066917628, ack 2157411799, win 65535, length 0
20:12:24.938978 IP 10.42.0.233.43036 > lq-in-f94.1e100.net.https: Flags [FP.], seq 0:31, ack 1, win 399, options [nop,nop,TS val 24446587 ecr 1300489796], length 31
20:12:28.760356 IP gnu > 10.42.0.233: ICMP echo request, id 62684, seq 1, length 64
20:12:29.022967 IP 10.42.0.233 > gnu: ICMP echo reply, id 62684, seq 1, length 64
20:12:30.248680 IP gnu.56520 > 10.42.0.233.8022: Flags [P.], seq 80:116, ack 181, win 501, options [nop,nop,TS val 4178339618 ecr 24446256], length 36
20:12:30.473792 IP 10.42.0.233.8022 > gnu.56520: Flags [P.], seq 181:217, ack 116, win 407, options [nop,nop,TS val 24446693 ecr 4178339618], length 36
20:12:30.473855 IP gnu.56520 > 10.42.0.233.8022: Flags [.], ack 217, win 501, options [nop,nop,TS val 4178339843 ecr 24446693], length 0
20:12:30.474873 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [F.], seq 315, ack 1, win 343, options [nop,nop,TS val 24446693 ecr 3641249083,nop,nop,sack 1 {4184:4185}], length 0
20:12:30.475747 IP 10.42.0.233.8022 > gnu.56520: Flags [P.], seq 217:261, ack 116, win 407, options [nop,nop,TS val 24446693 ecr 4178339843], length 44
20:12:30.475786 IP gnu.56520 > 10.42.0.233.8022: Flags [.], ack 261, win 501, options [nop,nop,TS val 4178339845 ecr 24446693], length 0
20:12:31.700334 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [F.], seq 315, ack 1, win 343, options [nop,nop,TS val 24446739 ecr 3641249083,nop,nop,sack 1 {4184:4185}], length 0
20:12:32.439385 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [F.], seq 315, ack 1, win 343, options [nop,nop,TS val 24446785 ecr 3641249083,nop,nop,sack 1 {4184:4185}], length 0
^C
41 packets captured
41 packets received by filter
0 packets dropped by kernel
dron@gnu:~$
Перед рукопожатием должен же вроде маленький файлик скачатся как там его я забыл название и на основе него выполнятся соединение. Но len=0
https://www.youtube.com/watch?v=LWOPpqm5LMA
Исправление LINUX-ORG-RU, :
$ umame -a
No command umame found, did you mean:
Command uname in package coreutils
$ uname -a
Linux localhost 3.18.19+ #1 SMP PREEMPT Wed Apr 3 19:36:11 KST 2019 armv7l Android
$ openssl s_client -connect linux.org.ru:443
CONNECTED(00000003)
И всё висит, дальше ничего.
Я слыхал что какая то трабла с корневыми сертификатами была и старые дроиды типа 2,3 не могут половину интернета отрывать ибо в трабле замешан letsencrypt. Но у меня 6,0 андрюшка
$ termux-info
Packages CPU architecture:
arm
Subscribed repositories:
# sources.list
deb https://termux.net stable main
# game-repo (sources.list.d/game.list)
deb https://dl.bintray.com/grimler/game-packages-21 games stable
# science-repo (sources.list.d/science.list)
deb https://dl.bintray.com/grimler/science-packages-21 science stable
Updatable packages:
All packages up to date
Android version:
6.0
Kernel build information:
Linux localhost 3.18.19+ #1 SMP PREEMPT Wed Apr 3 19:36:11 KST 2019 armv7l Android
Device manufacturer:
LGE
Device model:
LG-K350
$
Вот что в tcpdump по wifi интерфейсу и адресу телефончика во время выполненияopenssl s_client -connect linux.org.ru:443
dron@gnu:~$ sudo tcpdump -i wlx6466b318bace host 10.42.0.233
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on wlx6466b318bace, link-type EN10MB (Ethernet), snapshot length 262144 bytes
20:12:01.896617 IP gnu.56520 > 10.42.0.233.8022: Flags [P.], seq 1405699504:1405699548, ack 2639997470, win 501, options [nop,nop,TS val 4178311266 ecr 24445794], length 44
20:12:02.000155 IP 10.42.0.233.8022 > gnu.56520: Flags [P.], seq 1:85, ack 44, win 407, options [nop,nop,TS val 24446144 ecr 4178311266], length 84
20:12:02.000211 IP gnu.56520 > 10.42.0.233.8022: Flags [.], ack 85, win 501, options [nop,nop,TS val 4178311369 ecr 24446144], length 0
20:12:02.178103 IP 10.42.0.233.45108 > 178.248.233.6.https: Flags [F.], seq 584274208, ack 1445175619, win 352, options [nop,nop,TS val 24446162 ecr 3641194222,nop,nop,sack 1 {2897:4184}], length 0
20:12:03.756012 IP gnu > 10.42.0.233: ICMP echo request, id 48015, seq 1, length 64
20:12:03.833659 IP 10.42.0.233 > gnu: ICMP echo reply, id 48015, seq 1, length 64
20:12:03.863380 IP 10.42.0.233.43036 > lq-in-f94.1e100.net.https: Flags [FP.], seq 1442454837:1442454868, ack 3252403628, win 399, options [nop,nop,TS val 24446218 ecr 1300489796], length 31
20:12:03.944535 IP gnu.56520 > 10.42.0.233.8022: Flags [P.], seq 44:80, ack 85, win 501, options [nop,nop,TS val 4178313314 ecr 24446144], length 36
20:12:03.947127 IP 10.42.0.233.8022 > gnu.56520: Flags [P.], seq 85:121, ack 80, win 407, options [nop,nop,TS val 24446226 ecr 4178313314], length 36
20:12:03.947181 IP gnu.56520 > 10.42.0.233.8022: Flags [.], ack 121, win 501, options [nop,nop,TS val 4178313316 ecr 24446226], length 0
20:12:04.887004 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [S], seq 4115025353, win 65535, options [mss 1460,sackOK,TS val 24446253 ecr 0,nop,wscale 8], length 0
20:12:04.896673 IP 178.248.233.6.https > 10.42.0.233.45109: Flags [S.], seq 238156078, ack 4115025354, win 5792, options [mss 1460,nop,wscale 9,sackOK,TS val 3641249083 ecr 24446253], length 0
20:12:04.897881 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [.], ack 1, win 343, options [nop,nop,TS val 24446256 ecr 3641249083], length 0
20:12:04.898104 IP 10.42.0.233.8022 > gnu.56520: Flags [P.], seq 121:181, ack 80, win 407, options [nop,nop,TS val 24446256 ecr 4178313316], length 60
20:12:04.898161 IP gnu.56520 > 10.42.0.233.8022: Flags [.], ack 181, win 501, options [nop,nop,TS val 4178314267 ecr 24446256], length 0
20:12:04.899229 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [P.], seq 1:315, ack 1, win 343, options [nop,nop,TS val 24446256 ecr 3641249083], length 314
20:12:05.902407 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [P.], seq 1:315, ack 1, win 343, options [nop,nop,TS val 24446279 ecr 3641249083], length 314
20:12:05.913286 IP 178.248.233.6.https > 10.42.0.233.45109: Flags [.], ack 315, win 60, options [nop,nop,TS val 3641250123 ecr 24446279,nop,nop,sack 1 {1:315}], length 0
20:12:08.759328 IP gnu > 10.42.0.233: ICMP echo request, id 39301, seq 1, length 64
20:12:08.953521 IP 10.42.0.233 > gnu: ICMP echo reply, id 39301, seq 1, length 64
20:12:09.907281 IP 178.248.233.6.https > 10.42.0.233.45109: Flags [F.], seq 4184, ack 315, win 60, options [nop,nop,TS val 3641254118 ecr 24446279], length 0
20:12:09.914847 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [.], ack 1, win 343, options [nop,nop,TS val 24446355 ecr 3641249083,nop,nop,sack 1 {4184:4185}], length 0
20:12:13.766003 IP gnu > 10.42.0.233: ICMP echo request, id 4897, seq 1, length 64
20:12:13.867988 IP 10.42.0.233 > gnu: ICMP echo reply, id 4897, seq 1, length 64
20:12:18.758371 IP gnu > 10.42.0.233: ICMP echo request, id 5151, seq 1, length 64
20:12:18.988841 IP 10.42.0.233 > gnu: ICMP echo reply, id 5151, seq 1, length 64
20:12:23.757116 IP gnu > 10.42.0.233: ICMP echo request, id 13910, seq 1, length 64
20:12:23.903611 IP 10.42.0.233 > gnu: ICMP echo reply, id 13910, seq 1, length 64
20:12:24.063844 IP 10.42.0.233.45108 > 178.248.233.6.https: Flags [F.], seq 0, ack 1, win 352, options [nop,nop,TS val 24446531 ecr 3641194222,nop,nop,sack 1 {2897:4184}], length 0
20:12:24.274316 IP 10.42.0.233.54869 > 203.247.157.116.47005: Flags [F.], seq 3066917628, ack 2157411799, win 65535, length 0
20:12:24.938978 IP 10.42.0.233.43036 > lq-in-f94.1e100.net.https: Flags [FP.], seq 0:31, ack 1, win 399, options [nop,nop,TS val 24446587 ecr 1300489796], length 31
20:12:28.760356 IP gnu > 10.42.0.233: ICMP echo request, id 62684, seq 1, length 64
20:12:29.022967 IP 10.42.0.233 > gnu: ICMP echo reply, id 62684, seq 1, length 64
20:12:30.248680 IP gnu.56520 > 10.42.0.233.8022: Flags [P.], seq 80:116, ack 181, win 501, options [nop,nop,TS val 4178339618 ecr 24446256], length 36
20:12:30.473792 IP 10.42.0.233.8022 > gnu.56520: Flags [P.], seq 181:217, ack 116, win 407, options [nop,nop,TS val 24446693 ecr 4178339618], length 36
20:12:30.473855 IP gnu.56520 > 10.42.0.233.8022: Flags [.], ack 217, win 501, options [nop,nop,TS val 4178339843 ecr 24446693], length 0
20:12:30.474873 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [F.], seq 315, ack 1, win 343, options [nop,nop,TS val 24446693 ecr 3641249083,nop,nop,sack 1 {4184:4185}], length 0
20:12:30.475747 IP 10.42.0.233.8022 > gnu.56520: Flags [P.], seq 217:261, ack 116, win 407, options [nop,nop,TS val 24446693 ecr 4178339843], length 44
20:12:30.475786 IP gnu.56520 > 10.42.0.233.8022: Flags [.], ack 261, win 501, options [nop,nop,TS val 4178339845 ecr 24446693], length 0
20:12:31.700334 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [F.], seq 315, ack 1, win 343, options [nop,nop,TS val 24446739 ecr 3641249083,nop,nop,sack 1 {4184:4185}], length 0
20:12:32.439385 IP 10.42.0.233.45109 > 178.248.233.6.https: Flags [F.], seq 315, ack 1, win 343, options [nop,nop,TS val 24446785 ecr 3641249083,nop,nop,sack 1 {4184:4185}], length 0
^C
41 packets captured
41 packets received by filter
0 packets dropped by kernel
dron@gnu:~$
Исходная версия LINUX-ORG-RU, :
$ umame -a
No command umame found, did you mean:
Command uname in package coreutils
$ uname -a
Linux localhost 3.18.19+ #1 SMP PREEMPT Wed Apr 3 19:36:11 KST 2019 armv7l Android
$ openssl s_client -connect linux.org.ru:443
CONNECTED(00000003)
И всё висит, дальше ничего.
Я слыхал что какая то трабла с корневыми сертификатами была и старые дроиды типа 2,3 не могут половину интернета отрывать ибо в трабле замешан letsencrypt. Но у меня 6,0 андрюшка
$ termux-info
Packages CPU architecture:
arm
Subscribed repositories:
# sources.list
deb https://termux.net stable main
# game-repo (sources.list.d/game.list)
deb https://dl.bintray.com/grimler/game-packages-21 games stable
# science-repo (sources.list.d/science.list)
deb https://dl.bintray.com/grimler/science-packages-21 science stable
Updatable packages:
All packages up to date
Android version:
6.0
Kernel build information:
Linux localhost 3.18.19+ #1 SMP PREEMPT Wed Apr 3 19:36:11 KST 2019 armv7l Android
Device manufacturer:
LGE
Device model:
LG-K350
$