Quantcast
Channel: OptimumOnline forum - dslreports.com
Viewing all articles
Browse latest Browse all 6568

[OOL] Optimum resetting my connection during speed tests?

$
0
0
Hi all--I couldn't find any relevant info on the net regarding this topic, so I'm posting here. I recently tried to run a normal speed test on my network using speedtest.net, and only a few seconds into the test, it would stop and throw an error: "Test failed to complete. Check your internet connection and try again." So, I tried a test using a different website: https://testmy.net/ --and this time, Chrome browser gave me an error "ERR_CONNECTION_CLOSED" Checking the JavaScript console on my browser also noted that the connection was closed/reset ("ERR_CONNECTION_RESET") So curious me, I opened Wireshark to see what was going on, and determine if it was my equipment. Sure enough, when I ran the tests, it would error out after a second. Wireshark spit out Dup ACK followed by a bunch of RSTs. X1618 4.644669 192.168.7.23 207.246.91.111 TCP 54 [TCP Window Update] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=127936 Len=0 1619 4.644770 192.168.7.23 207.246.91.111 TCP 54 [TCP Window Update] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=145344 Len=0 1620 4.644895 192.168.7.23 207.246.91.111 TCP 54 [TCP Window Update] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=162752 Len=0 1621 4.644956 192.168.7.23 207.246.91.111 TCP 54 [TCP Window Update] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=180160 Len=0 1622 4.645289 192.168.7.23 207.246.91.111 TCP 54 [TCP Window Update] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=197568 Len=0 1623 4.645420 192.168.7.23 207.246.91.111 TCP 54 [TCP Window Update] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=214976 Len=0 1624 4.645501 192.168.7.23 207.246.91.111 TCP 54 [TCP Window Update] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=232384 Len=0 1625 4.645501 192.168.7.23 207.246.91.111 TCP 54 [TCP Window Update] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=249792 Len=0 1626 4.645754 192.168.7.23 207.246.91.111 TCP 54 [TCP Window Update] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 1627 4.646994 207.246.91.111 192.168.7.23 TLSv1.2 1514 [TCP Previous segment not captured] , Ignored Unknown Record 1628 4.646999 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1629 4.647001 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1630 4.647002 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1631 4.647003 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1632 4.647066 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#1] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1779312 1633 4.647066 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#2] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1780772 1634 4.647110 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#3] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1782232 1635 4.647110 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#4] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1783692 1636 4.647145 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#5] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1785152 1637 4.648038 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1638 4.648042 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1639 4.648043 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1640 4.648044 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1641 4.648045 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1642 4.648048 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1643 4.648049 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1644 4.648050 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1645 4.648182 207.246.91.111 192.168.7.23 TLSv1.2 1514 Ignored Unknown Record 1646 4.648184 207.246.91.111 192.168.7.23 TLSv1.2 458 Ignored Unknown Record 1647 4.648196 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#6] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1786612 1648 4.648196 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#7] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1788072 1649 4.648196 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#8] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1789532 1650 4.648196 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#9] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1790992 1651 4.648196 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#10] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1792452 1652 4.648196 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#11] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1793912 1653 4.648196 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#12] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1795372 1654 4.648197 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#13] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1796832 1655 4.648245 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#14] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1798292 1656 4.648245 192.168.7.23 207.246.91.111 TCP 66 [TCP Dup ACK 1617#15] 50191 → 443 [ACK] Seq=3763 Ack=1595352 Win=262144 Len=0 SLE=1777852 SRE=1798696 1657 4.650225 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1658 4.651252 104.28.12.113 192.168.7.23 TCP 60 443 → 50184 [ACK] Seq=688 Ack=403 Win=31 Len=0 1659 4.655860 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1660 4.655874 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1661 4.659943 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1662 4.659947 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1663 4.659948 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1664 4.659949 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1665 4.659950 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1666 4.660425 192.168.7.23 104.28.12.113 TLSv1.2 148 Application Data 1667 4.662279 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1668 4.662283 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1669 4.662283 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1670 4.662284 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1671 4.662284 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1672 4.662287 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1673 4.662288 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1674 4.662289 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 1675 4.662290 207.246.91.111 192.168.7.23 TCP 54 443 → 50191 [RST] Seq=1595352 Win=0 Len=0 Next, I tried turning on my VPN connection and repeating the same tests. Everything worked fine (probably since everything was passing through as UDP packets). What gives? I'm not an expert, but something fishy is going on. My DNS is Cloudflare (1.1.1.1). I'm using Eero devices as my router.

Viewing all articles
Browse latest Browse all 6568

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>