For instance try the filter "tcp.options.mptcp.rawdataseqno == 1822294653": you should see 3 packets sending the same data on 3 different TCP connections.
File: NTP_(4KB, showing the Network Time Protocol) Contributor: Gerald Combs Description: After reading about the round robin DNS records set up by the folks at org, I decided to use their service to sync my laptop's clock.
Currently, Wireshark doesn't support files with multiple Section Header Blocks, which this file has, so it cannot read it.
SMB-locking.(libpcap) SMB and SMB2 support opportunistic locking. If necessary, the server has to break conflicting locks by sending a lock request to the client.
This is a bit unusual: We see requests from the server.
gz (libpcap) Certificate Management Protocol (CMP) version 2 encapsulated in HTTP.
Full "Initialization Request" and rejected "Key Update Request". cmp_in_http_with_pkixcmp-poll_content_gz (libpcap) Certificate Management Protocol (CMP) version 2 encapsulated in HTTP.
A large number of lock requests is usually an indicator for poor performance.
If lock requests are made as blocking IOs, users will experience that their application freezes in a seemingly random manner.
redundant_stream1.pcapng iperf with a redundant scheduler, i.e., the same data is sent across several subflows at the same time.
Enable all the MPTCP options and you should be able to see Wireshark detect reinjections across subflows.
The CMP messages are of the deprecated but used content-type "pkixcmp-poll", so they are using the TCP transport style.