Advertisement
K_Werner

tunnel-down-initiator

Jul 17th, 2018
486
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.45 KB | None | 0 0
  1. Frame 667: 74 bytes on wire (592 bits), 74 bytes captured (592 bits)
  2. Ethernet II, Src: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0), Dst: RealtekU_12:35:02 (52:54:00:12:35:02)
  3. Internet Protocol Version 4, Src: 10.0.2.15, Dst: 192.168.137.129
  4. User Datagram Protocol, Src Port: 38362, Dst Port: 53
  5. Domain Name System (query)
  6. [Response In: 668]
  7. Transaction ID: 0x4a40
  8. Flags: 0x0100 Standard query
  9. Questions: 1
  10. Answer RRs: 0
  11. Authority RRs: 0
  12. Additional RRs: 0
  13. Queries
  14. www.google.com: type A, class IN
  15. Name: www.google.com
  16. [Name Length: 14]
  17. [Label Count: 3]
  18. Type: A (Host Address) (1)
  19. Class: IN (0x0001)
  20.  
  21. Frame 668: 90 bytes on wire (720 bits), 90 bytes captured (720 bits)
  22. Ethernet II, Src: RealtekU_12:35:02 (52:54:00:12:35:02), Dst: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0)
  23. Internet Protocol Version 4, Src: 192.168.137.129, Dst: 10.0.2.15
  24. User Datagram Protocol, Src Port: 53, Dst Port: 38362
  25. Domain Name System (response)
  26. [Request In: 667]
  27. [Time: 0.045719000 seconds]
  28. Transaction ID: 0x4a40
  29. Flags: 0x8180 Standard query response, No error
  30. Questions: 1
  31. Answer RRs: 1
  32. Authority RRs: 0
  33. Additional RRs: 0
  34. Queries
  35. www.google.com: type A, class IN
  36. Name: www.google.com
  37. [Name Length: 14]
  38. [Label Count: 3]
  39. Type: A (Host Address) (1)
  40. Class: IN (0x0001)
  41. Answers
  42. www.google.com: type A, class IN, addr 216.58.212.100
  43. Name: www.google.com
  44. Type: A (Host Address) (1)
  45. Class: IN (0x0001)
  46. Time to live: 86
  47. Data length: 4
  48. Address: 216.58.212.100
  49.  
  50. Frame 669: 74 bytes on wire (592 bits), 74 bytes captured (592 bits)
  51. Ethernet II, Src: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0), Dst: RealtekU_12:35:02 (52:54:00:12:35:02)
  52. Internet Protocol Version 4, Src: 10.0.2.15, Dst: 216.58.212.100
  53. Transmission Control Protocol, Src Port: 50084, Dst Port: 443, Seq: 0, Len: 0
  54. Source Port: 50084
  55. Destination Port: 443
  56. [Stream index: 10]
  57. [TCP Segment Len: 0]
  58. Sequence number: 0 (relative sequence number)
  59. Acknowledgment number: 0
  60. Header Length: 40 bytes
  61. Flags: 0x002 (SYN)
  62. 000. .... .... = Reserved: Not set
  63. ...0 .... .... = Nonce: Not set
  64. .... 0... .... = Congestion Window Reduced (CWR): Not set
  65. .... .0.. .... = ECN-Echo: Not set
  66. .... ..0. .... = Urgent: Not set
  67. .... ...0 .... = Acknowledgment: Not set
  68. .... .... 0... = Push: Not set
  69. .... .... .0.. = Reset: Not set
  70. .... .... ..1. = Syn: Set
  71. [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 443]
  72. [Connection establish request (SYN): server port 443]
  73. [Severity level: Chat]
  74. [Group: Sequence]
  75. .... .... ...0 = Fin: Not set
  76. [TCP Flags: ··········S·]
  77. Window size value: 29200
  78. [Calculated window size: 29200]
  79. Checksum: 0xb8dc [unverified]
  80. [Checksum Status: Unverified]
  81. Urgent pointer: 0
  82. Options: (20 bytes), Maximum segment size, SACK permitted, Timestamps, No-Operation (NOP), Window scale
  83. Maximum segment size: 1460 bytes
  84. TCP SACK Permitted Option: True
  85. Timestamps: TSval 235242, TSecr 0
  86. No-Operation (NOP)
  87. Type: 1
  88. 0... .... = Copy on fragmentation: No
  89. .00. .... = Class: Control (0)
  90. ...0 0001 = Number: No-Operation (NOP) (1)
  91. Window scale: 7 (multiply by 128)
  92.  
  93. Frame 670: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
  94. Ethernet II, Src: RealtekU_12:35:02 (52:54:00:12:35:02), Dst: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0)
  95. Internet Protocol Version 4, Src: 216.58.212.100, Dst: 10.0.2.15
  96. Transmission Control Protocol, Src Port: 443, Dst Port: 50084, Seq: 0, Ack: 1, Len: 0
  97. Source Port: 443
  98. Destination Port: 50084
  99. [Stream index: 10]
  100. [TCP Segment Len: 0]
  101. Sequence number: 0 (relative sequence number)
  102. Acknowledgment number: 1 (relative ack number)
  103. Header Length: 24 bytes
  104. Flags: 0x012 (SYN, ACK)
  105. 000. .... .... = Reserved: Not set
  106. ...0 .... .... = Nonce: Not set
  107. .... 0... .... = Congestion Window Reduced (CWR): Not set
  108. .... .0.. .... = ECN-Echo: Not set
  109. .... ..0. .... = Urgent: Not set
  110. .... ...1 .... = Acknowledgment: Set
  111. .... .... 0... = Push: Not set
  112. .... .... .0.. = Reset: Not set
  113. .... .... ..1. = Syn: Set
  114. [Expert Info (Chat/Sequence): Connection establish acknowledge (SYN+ACK): server port 443]
  115. [Connection establish acknowledge (SYN+ACK): server port 443]
  116. [Severity level: Chat]
  117. [Group: Sequence]
  118. .... .... ...0 = Fin: Not set
  119. [TCP Flags: ·······A··S·]
  120. Window size value: 65535
  121. [Calculated window size: 65535]
  122. Checksum: 0x471b [unverified]
  123. [Checksum Status: Unverified]
  124. Urgent pointer: 0
  125. Options: (4 bytes), Maximum segment size
  126. Maximum segment size: 1460 bytes
  127. [SEQ/ACK analysis]
  128. [This is an ACK to the segment in frame: 669]
  129. [The RTT to ACK the segment was: 0.228676000 seconds]
  130. [iRTT: 0.228784000 seconds]
  131.  
  132. Frame 671: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
  133. Ethernet II, Src: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0), Dst: RealtekU_12:35:02 (52:54:00:12:35:02)
  134. Internet Protocol Version 4, Src: 10.0.2.15, Dst: 216.58.212.100
  135. Transmission Control Protocol, Src Port: 50084, Dst Port: 443, Seq: 1, Ack: 1, Len: 0
  136. Source Port: 50084
  137. Destination Port: 443
  138. [Stream index: 10]
  139. [TCP Segment Len: 0]
  140. Sequence number: 1 (relative sequence number)
  141. Acknowledgment number: 1 (relative ack number)
  142. Header Length: 20 bytes
  143. Flags: 0x010 (ACK)
  144. 000. .... .... = Reserved: Not set
  145. ...0 .... .... = Nonce: Not set
  146. .... 0... .... = Congestion Window Reduced (CWR): Not set
  147. .... .0.. .... = ECN-Echo: Not set
  148. .... ..0. .... = Urgent: Not set
  149. .... ...1 .... = Acknowledgment: Set
  150. .... .... 0... = Push: Not set
  151. .... .... .0.. = Reset: Not set
  152. .... .... ..0. = Syn: Not set
  153. .... .... ...0 = Fin: Not set
  154. [TCP Flags: ·······A····]
  155. Window size value: 29200
  156. [Calculated window size: 29200]
  157. [Window size scaling factor: -2 (no window scaling used)]
  158. Checksum: 0xb8c8 [unverified]
  159. [Checksum Status: Unverified]
  160. Urgent pointer: 0
  161. [SEQ/ACK analysis]
  162. [This is an ACK to the segment in frame: 670]
  163. [The RTT to ACK the segment was: 0.000108000 seconds]
  164. [iRTT: 0.228784000 seconds]
  165.  
  166. Frame 672: 249 bytes on wire (1992 bits), 249 bytes captured (1992 bits)
  167. Ethernet II, Src: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0), Dst: RealtekU_12:35:02 (52:54:00:12:35:02)
  168. Internet Protocol Version 4, Src: 10.0.2.15, Dst: 216.58.212.100
  169. Transmission Control Protocol, Src Port: 50084, Dst Port: 443, Seq: 1, Ack: 1, Len: 195
  170. Source Port: 50084
  171. Destination Port: 443
  172. [Stream index: 10]
  173. [TCP Segment Len: 195]
  174. Sequence number: 1 (relative sequence number)
  175. [Next sequence number: 196 (relative sequence number)]
  176. Acknowledgment number: 1 (relative ack number)
  177. Header Length: 20 bytes
  178. Flags: 0x018 (PSH, ACK)
  179. 000. .... .... = Reserved: Not set
  180. ...0 .... .... = Nonce: Not set
  181. .... 0... .... = Congestion Window Reduced (CWR): Not set
  182. .... .0.. .... = ECN-Echo: Not set
  183. .... ..0. .... = Urgent: Not set
  184. .... ...1 .... = Acknowledgment: Set
  185. .... .... 1... = Push: Set
  186. .... .... .0.. = Reset: Not set
  187. .... .... ..0. = Syn: Not set
  188. .... .... ...0 = Fin: Not set
  189. [TCP Flags: ·······AP···]
  190. Window size value: 29200
  191. [Calculated window size: 29200]
  192. [Window size scaling factor: -2 (no window scaling used)]
  193. Checksum: 0xb98b [unverified]
  194. [Checksum Status: Unverified]
  195. Urgent pointer: 0
  196. [SEQ/ACK analysis]
  197. [iRTT: 0.228784000 seconds]
  198. [Bytes in flight: 195]
  199. [Bytes sent since last PSH flag: 195]
  200. Secure Sockets Layer
  201. TLSv1.2 Record Layer: Handshake Protocol: Client Hello
  202. Content Type: Handshake (22)
  203. Version: TLS 1.0 (0x0301)
  204. Length: 190
  205. Handshake Protocol: Client Hello
  206.  
  207. Frame 673: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
  208. Ethernet II, Src: RealtekU_12:35:02 (52:54:00:12:35:02), Dst: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0)
  209. Internet Protocol Version 4, Src: 216.58.212.100, Dst: 10.0.2.15
  210. Transmission Control Protocol, Src Port: 443, Dst Port: 50084, Seq: 1, Ack: 196, Len: 0
  211. Source Port: 443
  212. Destination Port: 50084
  213. [Stream index: 10]
  214. [TCP Segment Len: 0]
  215. Sequence number: 1 (relative sequence number)
  216. Acknowledgment number: 196 (relative ack number)
  217. Header Length: 20 bytes
  218. Flags: 0x010 (ACK)
  219. 000. .... .... = Reserved: Not set
  220. ...0 .... .... = Nonce: Not set
  221. .... 0... .... = Congestion Window Reduced (CWR): Not set
  222. .... .0.. .... = ECN-Echo: Not set
  223. .... ..0. .... = Urgent: Not set
  224. .... ...1 .... = Acknowledgment: Set
  225. .... .... 0... = Push: Not set
  226. .... .... .0.. = Reset: Not set
  227. .... .... ..0. = Syn: Not set
  228. .... .... ...0 = Fin: Not set
  229. [TCP Flags: ·······A····]
  230. Window size value: 65535
  231. [Calculated window size: 65535]
  232. [Window size scaling factor: -2 (no window scaling used)]
  233. Checksum: 0x5e15 [unverified]
  234. [Checksum Status: Unverified]
  235. Urgent pointer: 0
  236. [SEQ/ACK analysis]
  237. [This is an ACK to the segment in frame: 672]
  238. [The RTT to ACK the segment was: 0.000614000 seconds]
  239. [iRTT: 0.228784000 seconds]
  240.  
  241. Frame 680: 2369 bytes on wire (18952 bits), 2369 bytes captured (18952 bits)
  242. Ethernet II, Src: RealtekU_12:35:02 (52:54:00:12:35:02), Dst: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0)
  243. Internet Protocol Version 4, Src: 216.58.212.100, Dst: 10.0.2.15
  244. Transmission Control Protocol, Src Port: 443, Dst Port: 50084, Seq: 1, Ack: 196, Len: 2315
  245. Source Port: 443
  246. Destination Port: 50084
  247. [Stream index: 10]
  248. [TCP Segment Len: 2315]
  249. Sequence number: 1 (relative sequence number)
  250. [Next sequence number: 2316 (relative sequence number)]
  251. Acknowledgment number: 196 (relative ack number)
  252. Header Length: 20 bytes
  253. Flags: 0x018 (PSH, ACK)
  254. 000. .... .... = Reserved: Not set
  255. ...0 .... .... = Nonce: Not set
  256. .... 0... .... = Congestion Window Reduced (CWR): Not set
  257. .... .0.. .... = ECN-Echo: Not set
  258. .... ..0. .... = Urgent: Not set
  259. .... ...1 .... = Acknowledgment: Set
  260. .... .... 1... = Push: Set
  261. .... .... .0.. = Reset: Not set
  262. .... .... ..0. = Syn: Not set
  263. .... .... ...0 = Fin: Not set
  264. [TCP Flags: ·······AP···]
  265. Window size value: 65535
  266. [Calculated window size: 65535]
  267. [Window size scaling factor: -2 (no window scaling used)]
  268. Checksum: 0xc1d3 [unverified]
  269. [Checksum Status: Unverified]
  270. Urgent pointer: 0
  271. [SEQ/ACK analysis]
  272. [iRTT: 0.228784000 seconds]
  273. [Bytes in flight: 2315]
  274. [Bytes sent since last PSH flag: 2315]
  275. Secure Sockets Layer
  276. TLSv1.2 Record Layer: Handshake Protocol: Server Hello
  277. Content Type: Handshake (22)
  278. Version: TLS 1.2 (0x0303)
  279. Length: 72
  280. Handshake Protocol: Server Hello
  281. TLSv1.2 Record Layer: Handshake Protocol: Certificate
  282. Content Type: Handshake (22)
  283. Version: TLS 1.2 (0x0303)
  284. Length: 2104
  285. Handshake Protocol: Certificate
  286. TLSv1.2 Record Layer: Handshake Protocol: Server Key Exchange
  287. Content Type: Handshake (22)
  288. Version: TLS 1.2 (0x0303)
  289. Length: 115
  290. Handshake Protocol: Server Key Exchange
  291. TLSv1.2 Record Layer: Handshake Protocol: Server Hello Done
  292. Content Type: Handshake (22)
  293. Version: TLS 1.2 (0x0303)
  294. Length: 4
  295. Handshake Protocol: Server Hello Done
  296.  
  297. Frame 681: 54 bytes on wire (432 bits), 54 bytes captured (432 bits)
  298. Ethernet II, Src: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0), Dst: RealtekU_12:35:02 (52:54:00:12:35:02)
  299. Internet Protocol Version 4, Src: 10.0.2.15, Dst: 216.58.212.100
  300. Transmission Control Protocol, Src Port: 50084, Dst Port: 443, Seq: 196, Ack: 2316, Len: 0
  301. Source Port: 50084
  302. Destination Port: 443
  303. [Stream index: 10]
  304. [TCP Segment Len: 0]
  305. Sequence number: 196 (relative sequence number)
  306. Acknowledgment number: 2316 (relative ack number)
  307. Header Length: 20 bytes
  308. Flags: 0x010 (ACK)
  309. 000. .... .... = Reserved: Not set
  310. ...0 .... .... = Nonce: Not set
  311. .... 0... .... = Congestion Window Reduced (CWR): Not set
  312. .... .0.. .... = ECN-Echo: Not set
  313. .... ..0. .... = Urgent: Not set
  314. .... ...1 .... = Acknowledgment: Set
  315. .... .... 0... = Push: Not set
  316. .... .... .0.. = Reset: Not set
  317. .... .... ..0. = Syn: Not set
  318. .... .... ...0 = Fin: Not set
  319. [TCP Flags: ·······A····]
  320. Window size value: 32660
  321. [Calculated window size: 32660]
  322. [Window size scaling factor: -2 (no window scaling used)]
  323. Checksum: 0xb8c8 [unverified]
  324. [Checksum Status: Unverified]
  325. Urgent pointer: 0
  326. [SEQ/ACK analysis]
  327. [This is an ACK to the segment in frame: 680]
  328. [The RTT to ACK the segment was: 0.000047000 seconds]
  329. [iRTT: 0.228784000 seconds]
  330.  
  331. Frame 684: 147 bytes on wire (1176 bits), 147 bytes captured (1176 bits)
  332. Ethernet II, Src: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0), Dst: RealtekU_12:35:02 (52:54:00:12:35:02)
  333. Internet Protocol Version 4, Src: 10.0.2.15, Dst: 216.58.212.100
  334. Transmission Control Protocol, Src Port: 50084, Dst Port: 443, Seq: 196, Ack: 2316, Len: 93
  335. Source Port: 50084
  336. Destination Port: 443
  337. [Stream index: 10]
  338. [TCP Segment Len: 93]
  339. Sequence number: 196 (relative sequence number)
  340. [Next sequence number: 289 (relative sequence number)]
  341. Acknowledgment number: 2316 (relative ack number)
  342. Header Length: 20 bytes
  343. Flags: 0x018 (PSH, ACK)
  344. 000. .... .... = Reserved: Not set
  345. ...0 .... .... = Nonce: Not set
  346. .... 0... .... = Congestion Window Reduced (CWR): Not set
  347. .... .0.. .... = ECN-Echo: Not set
  348. .... ..0. .... = Urgent: Not set
  349. .... ...1 .... = Acknowledgment: Set
  350. .... .... 1... = Push: Set
  351. .... .... .0.. = Reset: Not set
  352. .... .... ..0. = Syn: Not set
  353. .... .... ...0 = Fin: Not set
  354. [TCP Flags: ·······AP···]
  355. Window size value: 32660
  356. [Calculated window size: 32660]
  357. [Window size scaling factor: -2 (no window scaling used)]
  358. Checksum: 0xb925 [unverified]
  359. [Checksum Status: Unverified]
  360. Urgent pointer: 0
  361. [SEQ/ACK analysis]
  362. [iRTT: 0.228784000 seconds]
  363. [Bytes in flight: 93]
  364. [Bytes sent since last PSH flag: 93]
  365. Secure Sockets Layer
  366. TLSv1.2 Record Layer: Handshake Protocol: Client Key Exchange
  367. Content Type: Handshake (22)
  368. Version: TLS 1.2 (0x0303)
  369. Length: 37
  370. Handshake Protocol: Client Key Exchange
  371. TLSv1.2 Record Layer: Change Cipher Spec Protocol: Change Cipher Spec
  372. Content Type: Change Cipher Spec (20)
  373. Version: TLS 1.2 (0x0303)
  374. Length: 1
  375. Change Cipher Spec Message
  376. TLSv1.2 Record Layer: Handshake Protocol: Multiple Handshake Messages
  377. Content Type: Handshake (22)
  378. Version: TLS 1.2 (0x0303)
  379. Length: 40
  380. Handshake Protocol: Hello Request
  381. Handshake Protocol: Hello Request
  382.  
  383. Frame 685: 60 bytes on wire (480 bits), 60 bytes captured (480 bits)
  384. Ethernet II, Src: RealtekU_12:35:02 (52:54:00:12:35:02), Dst: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0)
  385. Internet Protocol Version 4, Src: 216.58.212.100, Dst: 10.0.2.15
  386. Transmission Control Protocol, Src Port: 443, Dst Port: 50084, Seq: 2316, Ack: 289, Len: 0
  387. Source Port: 443
  388. Destination Port: 50084
  389. [Stream index: 10]
  390. [TCP Segment Len: 0]
  391. Sequence number: 2316 (relative sequence number)
  392. Acknowledgment number: 289 (relative ack number)
  393. Header Length: 20 bytes
  394. Flags: 0x010 (ACK)
  395. 000. .... .... = Reserved: Not set
  396. ...0 .... .... = Nonce: Not set
  397. .... 0... .... = Congestion Window Reduced (CWR): Not set
  398. .... .0.. .... = ECN-Echo: Not set
  399. .... ..0. .... = Urgent: Not set
  400. .... ...1 .... = Acknowledgment: Set
  401. .... .... 0... = Push: Not set
  402. .... .... .0.. = Reset: Not set
  403. .... .... ..0. = Syn: Not set
  404. .... .... ...0 = Fin: Not set
  405. [TCP Flags: ·······A····]
  406. Window size value: 65535
  407. [Calculated window size: 65535]
  408. [Window size scaling factor: -2 (no window scaling used)]
  409. Checksum: 0x54ad [unverified]
  410. [Checksum Status: Unverified]
  411. Urgent pointer: 0
  412. [SEQ/ACK analysis]
  413. [This is an ACK to the segment in frame: 684]
  414. [The RTT to ACK the segment was: 0.000687000 seconds]
  415. [iRTT: 0.228784000 seconds]
  416.  
  417. Frame 694: 338 bytes on wire (2704 bits), 338 bytes captured (2704 bits)
  418. Ethernet II, Src: RealtekU_12:35:02 (52:54:00:12:35:02), Dst: PcsCompu_49:c7:a0 (08:00:27:49:c7:a0)
  419. Internet Protocol Version 4, Src: 216.58.212.100, Dst: 10.0.2.15
  420. Transmission Control Protocol, Src Port: 443, Dst Port: 50084, Seq: 2316, Ack: 289, Len: 284
  421. Source Port: 443
  422. Destination Port: 50084
  423. [Stream index: 10]
  424. [TCP Segment Len: 284]
  425. Sequence number: 2316 (relative sequence number)
  426. [Next sequence number: 2600 (relative sequence number)]
  427. Acknowledgment number: 289 (relative ack number)
  428. Header Length: 20 bytes
  429. Flags: 0x018 (PSH, ACK)
  430. 000. .... .... = Reserved: Not set
  431. ...0 .... .... = Nonce: Not set
  432. .... 0... .... = Congestion Window Reduced (CWR): Not set
  433. .... .0.. .... = ECN-Echo: Not set
  434. .... ..0. .... = Urgent: Not set
  435. .... ...1 .... = Acknowledgment: Set
  436. .... .... 1... = Push: Set
  437. .... .... .0.. = Reset: Not set
  438. .... .... ..0. = Syn: Not set
  439. .... .... ...0 = Fin: Not set
  440. [TCP Flags: ·······AP···]
  441. Window size value: 65535
  442. [Calculated window size: 65535]
  443. [Window size scaling factor: -2 (no window scaling used)]
  444. Checksum: 0x7f5d [unverified]
  445. [Checksum Status: Unverified]
  446. Urgent pointer: 0
  447. [SEQ/ACK analysis]
  448. [iRTT: 0.228784000 seconds]
  449. [Bytes in flight: 284]
  450. [Bytes sent since last PSH flag: 284]
  451. Secure Sockets Layer
  452. TLSv1.2 Record Layer: Handshake Protocol: New Session Ticket
  453. Content Type: Handshake (22)
  454. Version: TLS 1.2 (0x0303)
  455. Length: 228
  456. Handshake Protocol: New Session Ticket
  457. TLSv1.2 Record Layer: Change Cipher Spec Protocol: Change Cipher Spec
  458. Content Type: Change Cipher Spec (20)
  459. Version: TLS 1.2 (0x0303)
  460. Length: 1
  461. Change Cipher Spec Message
  462. TLSv1.2 Record Layer: Handshake Protocol: Multiple Handshake Messages
  463. Content Type: Handshake (22)
  464. Version: TLS 1.2 (0x0303)
  465. Length: 40
  466. Handshake Protocol: Hello Request
  467. Handshake Protocol: Hello Request
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement