Hallo zusammen,
falls es hilft, habe ich mal ein Packet Capture laufen lassen. System ist ein PI4 (192.168.178.79) mit Nexus.
233 1.918853 192.168.178.79 3.65.43.212 TCP 74 46090 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=932053286 TSecr=0 WS=128
236 1.927771 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=932053295 TSecr=4137614565
237 1.929002 192.168.178.79 3.65.43.212 TLSv1.2 583 Client Hello
242 1.938099 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=518 Ack=1441 Win=64128 Len=0 TSval=932053305 TSecr=4137614575
243 1.938222 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=518 Ack=2881 Win=64128 Len=0 TSval=932053305 TSecr=4137614575
245 1.938371 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=518 Ack=4321 Win=64128 Len=0 TSval=932053305 TSecr=4137614575
246 1.938513 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=518 Ack=5420 Win=64128 Len=0 TSval=932053306 TSecr=4137614576
247 1.945167 192.168.178.79 3.65.43.212 TLSv1.2 192 Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message
252 1.953818 192.168.178.79 3.65.43.212 TLSv1.2 328 Application Data
253 1.953887 192.168.178.79 3.65.43.212 TLSv1.2 203 Application Data
258 1.975076 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=8504 Win=64128 Len=0 TSval=932053342 TSecr=4137614612
261 1.975496 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=11384 Win=64128 Len=0 TSval=932053342 TSecr=4137614612
265 1.975997 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=14264 Win=64128 Len=0 TSval=932053343 TSecr=4137614612
268 1.976379 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=17144 Win=64128 Len=0 TSval=932053343 TSecr=4137614612
269 1.976699 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=20024 Win=64128 Len=0 TSval=932053344 TSecr=4137614612
272 1.983908 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=22904 Win=67072 Len=0 TSval=932053351 TSecr=4137614621
277 1.984516 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=25784 Win=72832 Len=0 TSval=932053351 TSecr=4137614621
280 1.984726 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=28664 Win=78592 Len=0 TSval=932053352 TSecr=4137614621
283 1.985142 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=31544 Win=84480 Len=0 TSval=932053352 TSecr=4137614621
284 1.985492 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=34424 Win=90240 Len=0 TSval=932053352 TSecr=4137614621
289 1.986082 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=37304 Win=96000 Len=0 TSval=932053353 TSecr=4137614621
292 1.986403 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=40184 Win=101760 Len=0 TSval=932053353 TSecr=4137614621
294 1.986716 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [ACK] Seq=1043 Ack=43064 Win=107648 Len=0 TSval=932053354 TSecr=4137614621
295 1.987160 192.168.178.79 3.65.43.212 TCP 66 46090 → 443 [FIN, ACK] Seq=1043 Ack=43301 Win=110464 Len=0 TSval=932053354 TSecr=4137614622
323 2.170402 192.168.178.79 18.245.86.74(rails.discovery.indazn.com) TCP 74 48830 → 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=606541526 TSecr=0 WS=128
325 2.179494 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=606541535 TSecr=997198666
326 2.180673 192.168.178.79 18.245.86.74 TLSv1.3 583 Client Hello
331 2.190579 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=518 Ack=1429 Win=64128 Len=0 TSval=606541547 TSecr=997198677
332 2.190702 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=518 Ack=2857 Win=62976 Len=0 TSval=606541547 TSecr=997198677
335 2.192232 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=518 Ack=4285 Win=64128 Len=0 TSval=606541548 TSecr=997198678
336 2.192290 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=518 Ack=4352 Win=64128 Len=0 TSval=606541548 TSecr=997198678
337 2.196348 192.168.178.79 18.245.86.74 TLSv1.3 130 Change Cipher Spec, Application Data
338 2.196663 192.168.178.79 18.245.86.74 TLSv1.3 341 Application Data
353 2.246052 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=857 Ack=4498 Win=64128 Len=0 TSval=606541602 TSecr=997198691
366 2.364470 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=857 Ack=6630 Win=64128 Len=0 TSval=606541720 TSecr=997198850
372 2.365319 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=857 Ack=12342 Win=59264 Len=0 TSval=606541721 TSecr=997198850
373 2.365548 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=857 Ack=15198 Win=64128 Len=0 TSval=606541721 TSecr=997198850
378 2.366207 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=857 Ack=18054 Win=64128 Len=0 TSval=606541722 TSecr=997198851
381 2.366492 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=857 Ack=20910 Win=64128 Len=0 TSval=606541722 TSecr=997198851
383 2.366715 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=857 Ack=23036 Win=64128 Len=0 TSval=606541723 TSecr=997198851
385 2.367077 192.168.178.79 18.245.86.74 TCP 66 48830 → 443 [ACK] Seq=857 Ack=25892 Win=64128 Len=0 TSval=606541723 TSecr=997198852
Kontaktiert werden die Server (Reihenfolge vielleicht nicht entscheidend)
user-profile.ar.indazn.com
ott-authz-bff-prod.ar.indazn.com
rails.discovery.indazn.com
rail-router.discovery.indazn.com
image.discovery.indazn.com
api.playback.indazn.com
Vielleicht erkennt da ja jemand was.
Grüsse
JD.