是什么导致发送 TCP/IP 重置 (RST) 标志? [英] What causes a TCP/IP reset (RST) flag to be sent?

查看:36
本文介绍了是什么导致发送 TCP/IP 重置 (RST) 标志?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我想弄清楚为什么我的应用程序的 TCP/IP 连接每 10 分钟(准确地说,在 1-2 秒内)就会出现一次打嗝.我运行了 Wireshark,发现在 10 分钟不活动后,另一端正在发送一个设置了重置 (RST) 标志的数据包.谷歌搜索告诉我RESET 标志表示接收器已变得困惑,因此想要中止连接",但这与我需要的细节有点少.什么可能导致这种情况?是否有可能是沿途的某个路由器负责它,或者这总是来自另一个端点?

I'm trying to figure out why my app's TCP/IP connection keeps hiccuping every 10 minutes (exactly, within 1-2 seconds). I ran Wireshark and discovered that after 10 minutes of inactivity the other end is sending a packet with the reset (RST) flag set. A google search tells me "the RESET flag signifies that the receiver has become confused and so wants to abort the connection" but that is a little short of the detail I need. What could be causing this? And is it possible that some router along the way is responsible for it or would this always come from the other endpoint?

在我的计算机和另一个端点之间有一个路由器(特别是 Linksys WRT-54G)——我应该在路由器设置中寻找什么吗?

There is a router (specifically a Linksys WRT-54G) sitting between my computer and the other endpoint -- is there anything I should look for in the router settings?

推荐答案

路由器"可以做任何事情 - 特别是 NAT,它可能涉及任何数量的漏洞缠身的流量混乱......

A 'router' could be doing anything - particularly NAT, which might involve any amount of bug-ridden messing with traffic...

设备发送 RST 的一个原因是为了响应接收到一个关闭套接字的数据包.

One reason a device will send a RST is in response to receiving a packet for a closed socket.

很难给出一个确定而笼统的答案,因为自 TCP 成立以来,所有可能的变态都已经在 TCP 上被访问过,并且各种各样的人可能会插入 RST 以试图阻止流量.(例如,一些国家防火墙"就是这样工作的.)

It's hard to give a firm but general answer, because every possible perversion has been visited on TCP since its inception, and all sorts of people might be inserting RSTs in an attempt to block traffic. (Some 'national firewalls' work like this, for example.)

这篇关于是什么导致发送 TCP/IP 重置 (RST) 标志?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆