是什么导致发送TCP/IP重置(RST)标志? [英] What causes a TCP/IP reset (RST) flag to be sent?

查看:689
本文介绍了是什么导致发送TCP/IP重置(RST)标志?的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我试图弄清楚为什么我的应用程序的TCP/IP连接每10分钟(确切地说是在1-2秒内)不断打h.我运行Wireshark,发现在闲置10分钟后,另一端正在发送设置了重置(RST)标志的数据包.谷歌搜索告诉我"RESET标志表示接收器已变得混乱,因此想中止连接",但是这比我需要的详细信息少了一点.是什么原因造成的?并可能有沿途的某个路由器负责它,还是总是来自另一个端点?

I'm trying to figure out why my app's TCP/IP connection keeps hiccuping every 10 minutes (exactly, within 1-2 seconds). I ran Wireshark and discovered that after 10 minutes of inactivity the other end is sending a packet with the reset (RST) flag set. A google search tells me "the RESET flag signifies that the receiver has become confused and so wants to abort the connection" but that is a little short of the detail I need. What could be causing this? And is it possible that some router along the way is responsible for it or would this always come from the other endpoint?

编辑:在我的计算机和另一个端点之间有一个路由器(特别是Linksys WRT-54G)-在路由器设置中我应该寻找什么吗?

There is a router (specifically a Linksys WRT-54G) sitting between my computer and the other endpoint -- is there anything I should look for in the router settings?

推荐答案

路由器"可能正在做任何事情-特别是NAT,它可能涉及到任何与流量有关的臭虫缠身...

A 'router' could be doing anything - particularly NAT, which might involve any amount of bug-ridden messing with traffic...

设备发送RST的原因之一是响应收到封闭套接字的数据包.

One reason a device will send a RST is in response to receiving a packet for a closed socket.

很难给出一个坚定而笼统的答案,因为自TCP诞生以来,所有可能的变态都已在TCP上进行了访问,并且各种各样的人可能正在插入RST来试图阻止流量. (例如,某些国家防火墙"的工作原理是这样的.)

It's hard to give a firm but general answer, because every possible perversion has been visited on TCP since its inception, and all sorts of people might be inserting RSTs in an attempt to block traffic. (Some 'national firewalls' work like this, for example.)

这篇关于是什么导致发送TCP/IP重置(RST)标志?的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆