curl(56) Recv failure: Connection reset by peer

Posted fan-gx

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了curl(56) Recv failure: Connection reset by peer相关的知识,希望对你有一定的参考价值。

遇到一个奇葩问题,访问我们自己的网站接口,有的网段访问正常, 有的网段访问,有时正常有时报 curl(56) Recv failure: Connection reset by peer 而且同一个网段访问也是这样 。
在本机上访问一直都是报这样的错误。

服务器的防火墙关闭了,ping没有丢包,telnet 端口正常,机器也重启了,还是不行,实在找不到解决办法,只能要求换机器了。

下面是用tcpdump抓包

# tcpdump -i bond0 host ip地址

###正常数据包

listening on bond0, link-type EN10MB (Ethernet), capture size 262144 bytes
10:20:06.251835 IP shpaas-container-c2-008.14492 > 10.7.34.137.http: Flags [S], seq 3133217419, win 29200, options [mss 1460,sackOK,TS val 2884918391 ecr 0,nop,wscale 9], length 0
10:20:06.254947 IP 10.7.34.137.http > shpaas-container-c2-008.14492: Flags [S.], seq 400517749, ack 3133217420, win 4380, options [mss 1460,nop,nop,TS val 8530366 ecr 2884918391,sackOK,eol], length 0
10:20:06.254998 IP shpaas-container-c2-008.14492 > 10.7.34.137.http: Flags [.], ack 1, win 29200, options [nop,nop,TS val 2884918395 ecr 8530366], length 0
10:20:06.255064 IP shpaas-container-c2-008.14492 > 10.7.34.137.http: Flags [P.], seq 1:108, ack 1, win 29200, options [nop,nop,TS val 2884918395 ecr 8530366], length 107: HTTP: HEAD /openApi/zwdtcert/login/login.do HTTP/1.1
10:20:06.257916 IP 10.7.34.137.http > shpaas-container-c2-008.14492: Flags [.], ack 108, win 4487, options [nop,nop,TS val 8530369 ecr 2884918395], length 0
10:20:06.274944 IP 10.7.34.137.http > shpaas-container-c2-008.14492: Flags [P.], seq 1:161, ack 108, win 4487, options [nop,nop,TS val 8530386 ecr 2884918395], length 160: HTTP: HTTP/1.1 401 Unauthorized
10:20:06.274973 IP shpaas-container-c2-008.14492 > 10.7.34.137.http: Flags [.], ack 161, win 30016, options [nop,nop,TS val 2884918415 ecr 8530386], length 0
10:20:06.275207 IP shpaas-container-c2-008.14492 > 10.7.34.137.http: Flags [F.], seq 108, ack 161, win 30016, options [nop,nop,TS val 2884918415 ecr 8530386], length 0
10:20:06.278058 IP 10.7.34.137.http > shpaas-container-c2-008.14492: Flags [.], ack 109, win 4487, options [nop,nop,TS val 8530389 ecr 2884918415], length 0
10:20:06.278783 IP 10.7.34.137.http > shpaas-container-c2-008.14492: Flags [F.], seq 161, ack 109, win 4487, options [nop,nop,TS val 8530390 ecr 2884918415], length 0
10:20:06.278817 IP shpaas-container-c2-008.14492 > 10.7.34.137.http: Flags [.], ack 162, win 30016, options [nop,nop,TS val 2884918418 ecr 8530390], length 0
10:20:22.977354 IP shpaas-container-c2-008.17868 > 10.7.34.137.http: Flags [S], seq 3278439648, win 29200, options [mss 1460,sackOK,TS val 2884935117 ecr 0,nop,wscale 9], length 0
10:20:22.980484 IP 10.7.34.137.http > shpaas-container-c2-008.17868: Flags [S.], seq 763138052, ack 3278439649, win 4380, options [mss 1460,nop,nop,TS val 8547091 ecr 2884935117,sackOK,eol], length 0
10:20:22.980543 IP shpaas-container-c2-008.17868 > 10.7.34.137.http: Flags [.], ack 1, win 29200, options [nop,nop,TS val 2884935120 ecr 8547091], length 0
10:20:22.980656 IP shpaas-container-c2-008.17868 > 10.7.34.137.http: Flags [P.], seq 1:108, ack 1, win 29200, options [nop,nop,TS val 2884935120 ecr 8547091], length 107: HTTP: HEAD /openApi/zwdtcert/login/login.do HTTP/1.1
10:20:22.983543 IP 10.7.34.137.http > shpaas-container-c2-008.17868: Flags [.], ack 108, win 4487, options [nop,nop,TS val 8547094 ecr 2884935120], length 0
10:20:23.000406 IP 10.7.34.137.http > shpaas-container-c2-008.17868: Flags [P.], seq 1:161, ack 108, win 4487, options [nop,nop,TS val 8547111 ecr 2884935120], length 160: HTTP: HTTP/1.1 401 Unauthorized
10:20:23.000436 IP shpaas-container-c2-008.17868 > 10.7.34.137.http: Flags [.], ack 161, win 30016, options [nop,nop,TS val 2884935140 ecr 8547111], length 0
10:20:23.000708 IP shpaas-container-c2-008.17868 > 10.7.34.137.http: Flags [F.], seq 108, ack 161, win 30016, options [nop,nop,TS val 2884935140 ecr 8547111], length 0
10:20:23.003547 IP 10.7.34.137.http > shpaas-container-c2-008.17868: Flags [.], ack 109, win 4487, options [nop,nop,TS val 8547114 ecr 2884935140], length 0
10:20:23.003793 IP 10.7.34.137.http > shpaas-container-c2-008.17868: Flags [F.], seq 161, ack 109, win 4487, options [nop,nop,TS val 8547114 ecr 2884935140], length 0
10:20:23.003815 IP shpaas-container-c2-008.17868 > 10.7.34.137.http: Flags [.], ack 162, win 30016, options [nop,nop,TS val 2884935143 ecr 8547114], length 0


###异常数据包
10:21:27.336118 IP shpaas-container-c2-008.6987 > 10.7.34.137.http: Flags [S], seq 2469240435, win 29200, options [mss 1460,sackOK,TS val 2884999475 ecr 0,nop,wscale 9], length 0
10:21:27.339227 IP 10.7.34.137.http > shpaas-container-c2-008.6987: Flags [S.], seq 4274905813, ack 2469240436, win 4380, options [mss 1460,nop,nop,TS val 8611447 ecr 2884999475,sackOK,eol], length 0
10:21:27.339280 IP shpaas-container-c2-008.6987 > 10.7.34.137.http: Flags [.], ack 1, win 29200, options [nop,nop,TS val 2884999479 ecr 8611447], length 0
10:21:27.339389 IP shpaas-container-c2-008.6987 > 10.7.34.137.http: Flags [P.], seq 1:108, ack 1, win 29200, options [nop,nop,TS val 2884999479 ecr 8611447], length 107: HTTP: HEAD /openApi/zwdtcert/login/login.do HTTP/1.1
10:21:27.342223 IP 10.7.34.137.http > shpaas-container-c2-008.6987: Flags [.], ack 108, win 4487, options [nop,nop,TS val 8611450 ecr 2884999479], length 0
10:21:31.342331 IP 10.7.34.137.http > shpaas-container-c2-008.6987: Flags [R.], seq 1, ack 108, win 4487, length 0

以上是关于curl(56) Recv failure: Connection reset by peer的主要内容,如果未能解决你的问题,请参考以下文章

docker Mule-server curl: (56) Recv failure: Connection reset by peer

sourceTree :报错error: RPC failed; curl 56 Recv failure: Connection reset by peer

CentOS7 yum的一次报错" 14: curl#56 - "Recv failure: Connection reset by peer" "

CentOS7 yum的一次报错" 14: curl#56 - "Recv failure: Connection reset by peer" "

Docker和K8s实战——Docker安装Node.js出现curl:Recv failure: Connection reset by peer问题

Docker和K8s实战——Docker安装Node.js出现curl:Recv failure: Connection reset by peer问题