Issue browsing to certain sites (possibly related to MTU/MSS fragmentation problems)

Hi,

I’m having an issue where I’m unable to navigate to certain websites.
TCP MSS clamping would be an obvious culprit, but seems to be set correctly.

My setup is as follows:
eth0 - WAN connection
pppoe0 - PPPoE interface going through eth0
eth1 - LAN (+ VLANs)
wg0 - Wireguard VPN I route outgoing traffic of certain clients through

If I try navigation to e.g. the UPS tracking website from my desktop computer (going through wg0) I don’t notice any issues. Using my phone (directly through pppoe0) on the other hand, the site doesn’t load and times out after a while. Switching the phone over to wg0 solves the problem as well.

Looking at the tcpdump, the MSS of the SYN packet is set correctly and I receive a response from the server. Somewhere down the line the client sends a rather large packet (1440 bytes) and doesn’t receive a response back. Even later, the server responds with “ICMP ip reassembly time exceeded”, meaning the packet probably got dropped along the way. The part I don’t get is why the outgoing packet is fragmented at all. Shouldn’t the MSS clamping prevent this from happening?

MSS clamping is set using:

# show firewall options 
    interface pppoe0 {
        adjust-mss 1452
    }
    interface wg0 {
        adjust-mss 1372
    }

tcpdump:

# run monitor traffic interface pppoe0 filter "src a23-53-169-165.deploy.static.akamaitechnologies.com or dst a23-53-169-165.deploy.static.akamaitechnologies.com"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on pppoe0, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
04:57:17.328018 IP xxx.xxx.xxx.xxx.37385 > 23.53.169.165.443: Flags [S], seq 3892026871, win 65535, options [mss 1452,sackOK,TS val 24448361 ecr 0,nop,wscale 8], length 0
04:57:17.336698 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37384: Flags [S.], seq 1086109722, ack 668892238, win 28960, options [mss 1460,sackOK,TS val 1329967199 ecr 24448361,nop,wscale 7], length 0
04:57:17.336706 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37385: Flags [S.], seq 1101894480, ack 3892026872, win 28960, options [mss 1460,sackOK,TS val 1329967199 ecr 24448361,nop,wscale 7], length 0
04:57:17.339030 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], ack 1, win 343, options [nop,nop,TS val 24448363 ecr 1329967199], length 0
04:57:17.339261 IP xxx.xxx.xxx.xxx.37385 > 23.53.169.165.443: Flags [.], ack 1, win 343, options [nop,nop,TS val 24448363 ecr 1329967199], length 0
04:57:17.340614 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [P.], seq 1:518, ack 1, win 343, options [nop,nop,TS val 24448363 ecr 1329967199], length 517
04:57:17.340865 IP xxx.xxx.xxx.xxx.37385 > 23.53.169.165.443: Flags [P.], seq 1:518, ack 1, win 343, options [nop,nop,TS val 24448363 ecr 1329967199], length 517
04:57:17.349437 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37384: Flags [.], ack 518, win 235, options [nop,nop,TS val 1329967212 ecr 24448363], length 0
04:57:17.349638 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37384: Flags [P.], seq 1:153, ack 518, win 235, options [nop,nop,TS val 1329967212 ecr 24448363], length 152
04:57:17.349754 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37385: Flags [.], ack 518, win 235, options [nop,nop,TS val 1329967212 ecr 24448363], length 0
04:57:17.349942 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37385: Flags [P.], seq 1:153, ack 518, win 235, options [nop,nop,TS val 1329967212 ecr 24448363], length 152
04:57:17.351881 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], ack 153, win 343, options [nop,nop,TS val 24448364 ecr 1329967212], length 0
04:57:17.352159 IP xxx.xxx.xxx.xxx.37385 > 23.53.169.165.443: Flags [.], ack 153, win 343, options [nop,nop,TS val 24448364 ecr 1329967212], length 0
04:57:17.352526 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [P.], seq 518:569, ack 153, win 343, options [nop,nop,TS val 24448364 ecr 1329967212], length 51
04:57:17.354985 IP xxx.xxx.xxx.xxx.37385 > 23.53.169.165.443: Flags [P.], seq 518:569, ack 153, win 343, options [nop,nop,TS val 24448364 ecr 1329967212], length 51
04:57:17.356232 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24448365 ecr 1329967212], length 1440
04:57:17.356247 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
04:57:17.356630 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [P.], seq 2017:3233, ack 153, win 343, options [nop,nop,TS val 24448365 ecr 1329967212], length 1216
04:57:17.365691 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37384: Flags [.], ack 569, win 258, options [nop,nop,TS val 1329967228 ecr 24448364,nop,nop,sack 1 {2017:3233}], length 0
04:57:17.375507 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24448367 ecr 1329967228], length 1440
04:57:17.375522 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
04:57:17.405186 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37385: Flags [.], ack 569, win 235, options [nop,nop,TS val 1329967268 ecr 24448364], length 0
04:57:17.606139 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24448390 ecr 1329967228], length 1440
04:57:17.606171 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
04:57:18.066836 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24448436 ecr 1329967228], length 1440
04:57:18.066862 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
04:57:18.998590 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24448528 ecr 1329967228], length 1440
04:57:18.998619 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
04:57:20.849989 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24448713 ecr 1329967228], length 1440
04:57:20.850018 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
04:57:24.539729 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24449082 ecr 1329967228], length 1440
04:57:24.539758 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
04:57:31.909410 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24449820 ecr 1329967228], length 1440
04:57:31.909439 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
04:57:37.349379 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37384: Flags [F.], seq 184, ack 569, win 258, options [nop,nop,TS val 1329987212 ecr 24448364,nop,nop,sack 1 {2017:3233}], length 0
04:57:37.349382 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37384: Flags [P.], seq 153:184, ack 569, win 258, options [nop,nop,TS val 1329987212 ecr 24448364,nop,nop,sack 1 {2017:3233}], length 31
04:57:37.350378 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37385: Flags [F.], seq 184, ack 569, win 235, options [nop,nop,TS val 1329987213 ecr 24448364], length 0
04:57:37.350386 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37385: Flags [P.], seq 153:184, ack 569, win 235, options [nop,nop,TS val 1329987213 ecr 24448364], length 31
04:57:37.378129 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37384: Flags [F.], seq 184, ack 569, win 258, options [nop,nop,TS val 1329987241 ecr 24448364,nop,nop,sack 1 {2017:3233}], length 0
04:57:37.379121 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37385: Flags [F.], seq 184, ack 569, win 235, options [nop,nop,TS val 1329987242 ecr 24448364], length 0
04:57:37.436615 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], ack 153, win 343, options [nop,nop,TS val 24450373 ecr 1329967228,nop,nop,sack 1 {184:185}], length 0
04:57:37.436942 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], ack 185, win 343, options [nop,nop,TS val 24450373 ecr 1329987212], length 0
04:57:37.436981 IP xxx.xxx.xxx.xxx.37385 > 23.53.169.165.443: Flags [.], ack 153, win 343, options [nop,nop,TS val 24450373 ecr 1329967268,nop,nop,sack 1 {184:185}], length 0
04:57:37.437254 IP xxx.xxx.xxx.xxx.37385 > 23.53.169.165.443: Flags [.], ack 185, win 343, options [nop,nop,TS val 24450373 ecr 1329987213], length 0
04:57:37.437518 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], ack 185, win 343, options [nop,nop,TS val 24450373 ecr 1329987241,nop,nop,sack 1 {184:185}], length 0
04:57:37.437555 IP xxx.xxx.xxx.xxx.37385 > 23.53.169.165.443: Flags [.], ack 185, win 343, options [nop,nop,TS val 24450373 ecr 1329987242,nop,nop,sack 1 {184:185}], length 0
04:57:37.439803 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [F.], seq 3233, ack 185, win 343, options [nop,nop,TS val 24450373 ecr 1329987241], length 0
04:57:37.445428 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37384: Flags [P.], seq 153:184, ack 569, win 258, options [nop,nop,TS val 1329987308 ecr 24448364,nop,nop,sack 1 {2017:3233}], length 31
04:57:37.445677 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37385: Flags [P.], seq 153:184, ack 569, win 235, options [nop,nop,TS val 1329987308 ecr 24450373], length 31
04:57:37.448263 IP xxx.xxx.xxx.xxx.37384 > 23.53.169.165.443: Flags [.], ack 185, win 343, options [nop,nop,TS val 24450374 ecr 1329987241,nop,nop,sack 1 {153:184}], length 0
04:57:37.448301 IP xxx.xxx.xxx.xxx.37385 > 23.53.169.165.443: Flags [.], ack 185, win 343, options [nop,nop,TS val 24450374 ecr 1329987242,nop,nop,sack 1 {153:184}], length 0
04:57:37.448346 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37384: Flags [R], seq 1086109907, win 0, length 0
04:57:37.456883 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.37384: Flags [R], seq 1086109907, win 0, length 0
04:57:47.370122 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
04:57:47.882370 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
04:57:47.882377 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
04:57:48.394155 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
04:57:49.418179 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
04:57:50.954214 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
04:57:55.050066 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
04:58:02.218258 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
^C
61 packets captured
62 packets received by filter
0 packets dropped by kernel

Hi,
Try setting MTU to 1492 and MSS to 1444 to accommodate for the smaller MTU.

The MTU of pppoe0 was already set to 1492. Lowering the MTU from 1452 to 1444 did not help. The tcpdump looks similar to the one already posted.

I checked several sites with PPPoE where we use Unifi routers, which are very similar.
Some have MSS set at 1412 and one as low as 1380. It helps to try to lower it a lot and keep incrementing it until it breaks to find the sweatspot. Why it needs to be this low i cannot really answer, it should work at 1452, but it probably depends on the infrastructure of your provider.

I just tried lowering the MSS further and further and stopped at 500, where it still didn’t work.
What I found interesting is, that the dropped packet still has a length of 1440 and doesn’t seem to be affected by the MSS at all.

I then checked the docs again and found the PPPoE Wiki article, which applies MSS clamping “manually” by creating a policy and noticed, that it applies the policy to both eth0 and eth1 while the newer MSS clamping article sets the firewall option only for eth0 (like I did).

Adding the firewall option to my internal interface eth1.30 as well solved the issue (while using 1452 MSS).

# show firewall options
 interface eth1.30 {
     adjust-mss 1452
 }
 interface pppoe0 {
     adjust-mss 1452
 }
 interface wg0 {
     adjust-mss 1372
 }

Why is clamping on both interfaces necessary? Shouldn’t clamping on eth0 technically suffice? Is the documentation wrong and should include eth1?

What makes it even weirder now is that if I loaded the website successfully and delete the firewall option from eth1, it will continue to work until I stop the Chrome app (Android) completely and start it again.

tcpdump with 500 MSS for reference:

# run monitor traffic interface pppoe0 filter "src a23-53-169-165.deploy.static.akamaitechnologies.com or dst a23-53-169-165.deploy.static.akamaitechnologies.com"
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on pppoe0, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
09:47:37.839956 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [S], seq 3011939508, win 65535, options [mss 500,sackOK,TS val 24822753 ecr 0,nop,wscale 8], length 0
09:47:37.840539 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [S], seq 1566568839, win 65535, options [mss 500,sackOK,TS val 24822753 ecr 0,nop,wscale 8], length 0
09:47:37.848635 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [S.], seq 1074863409, ack 3011939509, win 28960, options [mss 1460,sackOK,TS val 1347387992 ecr 24822753,nop,wscale 7], length 0
09:47:37.849139 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [S.], seq 1099350047, ack 1566568840, win 28960, options [mss 1460,sackOK,TS val 1347387992 ecr 24822753,nop,wscale 7], length 0
09:47:37.850846 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 1, win 343, options [nop,nop,TS val 24822754 ecr 1347387992], length 0
09:47:37.851047 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 1, win 343, options [nop,nop,TS val 24822754 ecr 1347387992], length 0
09:47:37.851306 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [P.], seq 1:518, ack 1, win 343, options [nop,nop,TS val 24822754 ecr 1347387992], length 517
09:47:37.851880 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [P.], seq 1:518, ack 1, win 343, options [nop,nop,TS val 24822754 ecr 1347387992], length 517
09:47:37.860197 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [.], ack 518, win 235, options [nop,nop,TS val 1347388004 ecr 24822754], length 0
09:47:37.860388 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [.], seq 1:489, ack 518, win 235, options [nop,nop,TS val 1347388004 ecr 24822754], length 488
09:47:37.860390 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [.], seq 489:977, ack 518, win 235, options [nop,nop,TS val 1347388004 ecr 24822754], length 488
09:47:37.860392 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [.], seq 977:1465, ack 518, win 235, options [nop,nop,TS val 1347388004 ecr 24822754], length 488
09:47:37.860393 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [.], seq 1465:1953, ack 518, win 235, options [nop,nop,TS val 1347388004 ecr 24822754], length 488
09:47:37.860600 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [.], ack 518, win 235, options [nop,nop,TS val 1347388004 ecr 24822754], length 0
09:47:37.860847 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [.], seq 1:489, ack 518, win 235, options [nop,nop,TS val 1347388004 ecr 24822754], length 488
09:47:37.860853 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [.], seq 489:977, ack 518, win 235, options [nop,nop,TS val 1347388004 ecr 24822754], length 488
09:47:37.860948 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [.], seq 977:1465, ack 518, win 235, options [nop,nop,TS val 1347388004 ecr 24822754], length 488
09:47:37.860952 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [.], seq 1465:1953, ack 518, win 235, options [nop,nop,TS val 1347388004 ecr 24822754], length 488
09:47:37.861922 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 489, win 343, options [nop,nop,TS val 24822755 ecr 1347388004], length 0
09:47:37.861964 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 977, win 343, options [nop,nop,TS val 24822755 ecr 1347388004], length 0
09:47:37.862010 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 1465, win 343, options [nop,nop,TS val 24822755 ecr 1347388004], length 0
09:47:37.863062 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 1953, win 343, options [nop,nop,TS val 24822755 ecr 1347388004], length 0
09:47:37.863392 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 489, win 343, options [nop,nop,TS val 24822755 ecr 1347388004], length 0
09:47:37.863443 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 977, win 343, options [nop,nop,TS val 24822755 ecr 1347388004], length 0
09:47:37.863486 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 1465, win 343, options [nop,nop,TS val 24822755 ecr 1347388004], length 0
09:47:37.863529 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 1953, win 343, options [nop,nop,TS val 24822755 ecr 1347388004], length 0
09:47:37.870620 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [.], seq 1953:2441, ack 518, win 235, options [nop,nop,TS val 1347388014 ecr 24822755], length 488
09:47:37.870627 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [.], seq 2441:2929, ack 518, win 235, options [nop,nop,TS val 1347388014 ecr 24822755], length 488
09:47:37.870629 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [.], seq 2929:3417, ack 518, win 235, options [nop,nop,TS val 1347388014 ecr 24822755], length 488
09:47:37.870786 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [.], seq 3417:3905, ack 518, win 235, options [nop,nop,TS val 1347388014 ecr 24822755], length 488
09:47:37.870791 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [P.], seq 4393:4536, ack 518, win 235, options [nop,nop,TS val 1347388014 ecr 24822755], length 143
09:47:37.870793 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [.], seq 3905:4393, ack 518, win 235, options [nop,nop,TS val 1347388014 ecr 24822755], length 488
09:47:37.872131 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [.], seq 1953:2441, ack 518, win 235, options [nop,nop,TS val 1347388015 ecr 24822755], length 488
09:47:37.872135 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [.], seq 2441:2929, ack 518, win 235, options [nop,nop,TS val 1347388015 ecr 24822755], length 488
09:47:37.872136 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [.], seq 2929:3417, ack 518, win 235, options [nop,nop,TS val 1347388016 ecr 24822755], length 488
09:47:37.872137 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [.], seq 3417:3905, ack 518, win 235, options [nop,nop,TS val 1347388016 ecr 24822755], length 488
09:47:37.872300 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [.], seq 3905:4393, ack 518, win 235, options [nop,nop,TS val 1347388016 ecr 24822755], length 488
09:47:37.872303 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [P.], seq 4393:4536, ack 518, win 235, options [nop,nop,TS val 1347388016 ecr 24822755], length 143
09:47:37.873488 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 2441, win 343, options [nop,nop,TS val 24822756 ecr 1347388014], length 0
09:47:37.874014 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 2929, win 343, options [nop,nop,TS val 24822756 ecr 1347388014], length 0
09:47:37.874066 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 3417, win 343, options [nop,nop,TS val 24822756 ecr 1347388014], length 0
09:47:37.874109 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 3905, win 343, options [nop,nop,TS val 24822756 ecr 1347388014], length 0
09:47:37.874151 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 3905, win 343, options [nop,nop,TS val 24822756 ecr 1347388014,nop,nop,sack 1 {4393:4536}], length 0
09:47:37.874189 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [.], ack 4536, win 343, options [nop,nop,TS val 24822756 ecr 1347388014], length 0
09:47:37.874227 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 2441, win 343, options [nop,nop,TS val 24822756 ecr 1347388015], length 0
09:47:37.874266 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 2929, win 343, options [nop,nop,TS val 24822756 ecr 1347388015], length 0
09:47:37.874446 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 3417, win 343, options [nop,nop,TS val 24822756 ecr 1347388016], length 0
09:47:37.876511 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 3905, win 343, options [nop,nop,TS val 24822756 ecr 1347388016], length 0
09:47:37.876564 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 4393, win 343, options [nop,nop,TS val 24822756 ecr 1347388016], length 0
09:47:37.876607 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [.], ack 4536, win 343, options [nop,nop,TS val 24822756 ecr 1347388016], length 0
09:47:37.896453 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [P.], seq 518:644, ack 4536, win 343, options [nop,nop,TS val 24822758 ecr 1347388014], length 126
09:47:37.901201 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [P.], seq 518:644, ack 4536, win 343, options [nop,nop,TS val 24822759 ecr 1347388016], length 126
09:47:37.905447 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38255: Flags [P.], seq 4536:4794, ack 644, win 235, options [nop,nop,TS val 1347388049 ecr 24822758], length 258
09:47:37.910393 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38256: Flags [P.], seq 4536:4794, ack 644, win 235, options [nop,nop,TS val 1347388054 ecr 24822759], length 258
09:47:37.930589 IP xxx.xxx.xxx.xxx.38255 > 23.53.169.165.443: Flags [R.], seq 644, ack 4794, win 343, options [nop,nop,TS val 24822762 ecr 1347388049], length 0
09:47:37.930719 IP xxx.xxx.xxx.xxx.38256 > 23.53.169.165.443: Flags [R.], seq 644, ack 4794, win 343, options [nop,nop,TS val 24822762 ecr 1347388054], length 0
09:47:38.017094 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [S], seq 3036032391, win 65535, options [mss 500,sackOK,TS val 24822771 ecr 0,nop,wscale 8], length 0
09:47:38.025856 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [S.], seq 1103105903, ack 3036032392, win 28960, options [mss 1460,sackOK,TS val 1347388169 ecr 24822771,nop,wscale 7], length 0
09:47:38.027869 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 1, win 343, options [nop,nop,TS val 24822772 ecr 1347388169], length 0
09:47:38.030641 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [P.], seq 1:518, ack 1, win 343, options [nop,nop,TS val 24822772 ecr 1347388169], length 517
09:47:38.039395 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], ack 518, win 235, options [nop,nop,TS val 1347388183 ecr 24822772], length 0
09:47:38.039846 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], seq 1:489, ack 518, win 235, options [nop,nop,TS val 1347388183 ecr 24822772], length 488
09:47:38.039851 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], seq 489:977, ack 518, win 235, options [nop,nop,TS val 1347388183 ecr 24822772], length 488
09:47:38.039957 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], seq 977:1465, ack 518, win 235, options [nop,nop,TS val 1347388183 ecr 24822772], length 488
09:47:38.039961 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], seq 1465:1953, ack 518, win 235, options [nop,nop,TS val 1347388183 ecr 24822772], length 488
09:47:38.041524 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 489, win 343, options [nop,nop,TS val 24822773 ecr 1347388183], length 0
09:47:38.041716 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 977, win 343, options [nop,nop,TS val 24822773 ecr 1347388183], length 0
09:47:38.041789 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 1465, win 343, options [nop,nop,TS val 24822773 ecr 1347388183], length 0
09:47:38.041837 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 1953, win 343, options [nop,nop,TS val 24822773 ecr 1347388183], length 0
09:47:38.050157 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], seq 1953:2441, ack 518, win 235, options [nop,nop,TS val 1347388194 ecr 24822773], length 488
09:47:38.050161 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], seq 2441:2929, ack 518, win 235, options [nop,nop,TS val 1347388194 ecr 24822773], length 488
09:47:38.050347 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], seq 2929:3417, ack 518, win 235, options [nop,nop,TS val 1347388194 ecr 24822773], length 488
09:47:38.050352 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], seq 3417:3905, ack 518, win 235, options [nop,nop,TS val 1347388194 ecr 24822773], length 488
09:47:38.050439 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], seq 3905:4393, ack 518, win 235, options [nop,nop,TS val 1347388194 ecr 24822773], length 488
09:47:38.050444 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [P.], seq 4393:4536, ack 518, win 235, options [nop,nop,TS val 1347388194 ecr 24822773], length 143
09:47:38.051909 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 2441, win 343, options [nop,nop,TS val 24822774 ecr 1347388194], length 0
09:47:38.052190 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 2929, win 343, options [nop,nop,TS val 24822774 ecr 1347388194], length 0
09:47:38.052235 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 3417, win 343, options [nop,nop,TS val 24822774 ecr 1347388194], length 0
09:47:38.052309 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 3905, win 343, options [nop,nop,TS val 24822774 ecr 1347388194], length 0
09:47:38.052355 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 4393, win 343, options [nop,nop,TS val 24822774 ecr 1347388194], length 0
09:47:38.052445 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 4536, win 343, options [nop,nop,TS val 24822774 ecr 1347388194], length 0
09:47:38.057383 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [P.], seq 518:644, ack 4536, win 343, options [nop,nop,TS val 24822774 ecr 1347388194], length 126
09:47:38.058221 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], seq 644:2084, ack 4536, win 343, options [nop,nop,TS val 24822775 ecr 1347388194], length 1440
09:47:38.058241 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:38.058481 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [P.], seq 2092:3146, ack 4536, win 343, options [nop,nop,TS val 24822775 ecr 1347388194], length 1054
09:47:38.066649 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [P.], seq 4536:4794, ack 644, win 235, options [nop,nop,TS val 1347388210 ecr 24822774], length 258
09:47:38.067391 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [.], ack 644, win 251, options [nop,nop,TS val 1347388211 ecr 24822774,nop,nop,sack 1 {2092:3146}], length 0
09:47:38.077091 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], seq 644:2084, ack 4794, win 343, options [nop,nop,TS val 24822777 ecr 1347388210], length 1440
09:47:38.077112 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:38.280649 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [P.], seq 4536:4794, ack 644, win 251, options [nop,nop,TS val 1347388424 ecr 24822774,nop,nop,sack 1 {2092:3146}], length 258
09:47:38.282697 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 4794, win 343, options [nop,nop,TS val 24822797 ecr 1347388424,nop,nop,sack 1 {4536:4794}], length 0
09:47:38.297140 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], seq 644:2084, ack 4794, win 343, options [nop,nop,TS val 24822799 ecr 1347388424], length 1440
09:47:38.297163 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:38.750661 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], seq 644:2084, ack 4794, win 343, options [nop,nop,TS val 24822843 ecr 1347388424], length 1440
09:47:38.750690 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:39.630297 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], seq 644:2084, ack 4794, win 343, options [nop,nop,TS val 24822931 ecr 1347388424], length 1440
09:47:39.630327 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:41.388469 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], seq 644:2084, ack 4794, win 343, options [nop,nop,TS val 24823107 ecr 1347388424], length 1440
09:47:41.388498 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:41.544691 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
09:47:44.908437 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], seq 644:2084, ack 4794, win 343, options [nop,nop,TS val 24823460 ecr 1347388424], length 1440
09:47:44.908456 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:51.983554 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], seq 644:2084, ack 4794, win 343, options [nop,nop,TS val 24824166 ecr 1347388424], length 1440
09:47:51.983583 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:58.042089 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [F.], seq 4825, ack 644, win 251, options [nop,nop,TS val 1347408186 ecr 24822774,nop,nop,sack 1 {2092:3146}], length 0
09:47:58.042094 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [P.], seq 4794:4825, ack 644, win 251, options [nop,nop,TS val 1347408186 ecr 24822774,nop,nop,sack 1 {2092:3146}], length 31
09:47:58.067587 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [F.], seq 4825, ack 644, win 251, options [nop,nop,TS val 1347408211 ecr 24822774,nop,nop,sack 1 {2092:3146}], length 0
09:47:58.140906 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 4794, win 343, options [nop,nop,TS val 24824783 ecr 1347388424,nop,nop,sack 1 {4825:4826}], length 0
09:47:58.141064 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 4826, win 343, options [nop,nop,TS val 24824783 ecr 1347408186], length 0
09:47:58.141495 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 4826, win 343, options [nop,nop,TS val 24824783 ecr 1347408211,nop,nop,sack 1 {4825:4826}], length 0
09:47:58.143793 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [F.], seq 3146, ack 4826, win 343, options [nop,nop,TS val 24824783 ecr 1347408211], length 0
09:47:58.149637 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [P.], seq 4794:4825, ack 644, win 251, options [nop,nop,TS val 1347408293 ecr 24822774,nop,nop,sack 1 {2092:3146}], length 31
09:47:58.152341 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [R], seq 1103110729, win 0, length 0
09:47:58.153026 IP xxx.xxx.xxx.xxx.38257 > 23.53.169.165.443: Flags [.], ack 4826, win 343, options [nop,nop,TS val 24824784 ecr 1347408211,nop,nop,sack 1 {4794:4825}], length 0
09:47:58.161567 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38257: Flags [R], seq 1103110729, win 0, length 0
09:47:58.571872 IP xxx.xxx.xxx.xxx.38258 > 23.53.169.165.443: Flags [S], seq 579087216, win 65535, options [mss 500,sackOK,TS val 24824825 ecr 0,nop,wscale 8], length 0
09:47:58.571974 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [S], seq 2273944488, win 65535, options [mss 500,sackOK,TS val 24824825 ecr 0,nop,wscale 8], length 0
09:47:58.580673 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38259: Flags [S.], seq 2416038581, ack 2273944489, win 28960, options [mss 1460,sackOK,TS val 297188759 ecr 24824825,nop,wscale 7], length 0
09:47:58.580681 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38258: Flags [S.], seq 2428479177, ack 579087217, win 28960, options [mss 1460,sackOK,TS val 297188759 ecr 24824825,nop,wscale 7], length 0
09:47:58.583274 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], ack 1, win 343, options [nop,nop,TS val 24824827 ecr 297188759], length 0
09:47:58.583513 IP xxx.xxx.xxx.xxx.38258 > 23.53.169.165.443: Flags [.], ack 1, win 343, options [nop,nop,TS val 24824827 ecr 297188759], length 0
09:47:58.588222 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [P.], seq 1:518, ack 1, win 343, options [nop,nop,TS val 24824828 ecr 297188759], length 517
09:47:58.589189 IP xxx.xxx.xxx.xxx.38258 > 23.53.169.165.443: Flags [P.], seq 1:518, ack 1, win 343, options [nop,nop,TS val 24824828 ecr 297188759], length 517
09:47:58.596904 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38259: Flags [.], ack 518, win 235, options [nop,nop,TS val 297188775 ecr 24824828], length 0
09:47:58.597401 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38259: Flags [P.], seq 1:153, ack 518, win 235, options [nop,nop,TS val 297188776 ecr 24824828], length 152
09:47:58.598153 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38258: Flags [.], ack 518, win 235, options [nop,nop,TS val 297188777 ecr 24824828], length 0
09:47:58.598637 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38258: Flags [P.], seq 1:153, ack 518, win 235, options [nop,nop,TS val 297188777 ecr 24824828], length 152
09:47:58.599783 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], ack 153, win 343, options [nop,nop,TS val 24824829 ecr 297188776], length 0
09:47:58.600439 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [P.], seq 518:569, ack 153, win 343, options [nop,nop,TS val 24824829 ecr 297188776], length 51
09:47:58.600722 IP xxx.xxx.xxx.xxx.38258 > 23.53.169.165.443: Flags [.], ack 153, win 343, options [nop,nop,TS val 24824829 ecr 297188777], length 0
09:47:58.601568 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24824829 ecr 297188776], length 1440
09:47:58.601601 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:58.601896 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [P.], seq 2017:3083, ack 153, win 343, options [nop,nop,TS val 24824829 ecr 297188776], length 1066
09:47:58.602176 IP xxx.xxx.xxx.xxx.38258 > 23.53.169.165.443: Flags [P.], seq 518:569, ack 153, win 343, options [nop,nop,TS val 24824829 ecr 297188777], length 51
09:47:58.610941 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38259: Flags [.], ack 569, win 251, options [nop,nop,TS val 297188789 ecr 24824829,nop,nop,sack 1 {2017:3083}], length 0
09:47:58.617790 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24824831 ecr 297188789], length 1440
09:47:58.617809 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:58.651156 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38258: Flags [.], ack 569, win 235, options [nop,nop,TS val 297188830 ecr 24824829], length 0
09:47:58.837686 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24824853 ecr 297188789], length 1440
09:47:58.837711 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:47:59.277785 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24824897 ecr 297188789], length 1440
09:47:59.277812 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:48:00.157888 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24824985 ecr 297188789], length 1440
09:48:00.157919 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:48:01.930440 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24825161 ecr 297188789], length 1440
09:48:01.930469 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:48:05.463782 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24825514 ecr 297188789], length 1440
09:48:05.463811 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:48:08.169110 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
09:48:08.169119 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
09:48:08.680580 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
09:48:09.192629 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
09:48:09.704644 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
09:48:11.752695 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
09:48:12.523979 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], seq 569:2009, ack 153, win 343, options [nop,nop,TS val 24826220 ecr 297188789], length 1440
09:48:12.524010 IP xxx.xxx.xxx.xxx > 23.53.169.165: ip-proto-6
09:48:15.336530 IP 23.53.169.165 > xxx.xxx.xxx.xxx: ICMP ip reassembly time exceeded, length 556
09:48:18.596608 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38259: Flags [F.], seq 184, ack 569, win 251, options [nop,nop,TS val 297208775 ecr 24824829,nop,nop,sack 1 {2017:3083}], length 0
09:48:18.596616 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38259: Flags [P.], seq 153:184, ack 569, win 251, options [nop,nop,TS val 297208775 ecr 24824829,nop,nop,sack 1 {2017:3083}], length 31
09:48:18.597606 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38258: Flags [F.], seq 184, ack 569, win 235, options [nop,nop,TS val 297208776 ecr 24824829], length 0
09:48:18.597612 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38258: Flags [P.], seq 153:184, ack 569, win 235, options [nop,nop,TS val 297208776 ecr 24824829], length 31
09:48:18.599710 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], ack 153, win 343, options [nop,nop,TS val 24826829 ecr 297188789,nop,nop,sack 1 {184:185}], length 0
09:48:18.599994 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [.], ack 185, win 343, options [nop,nop,TS val 24826829 ecr 297208775], length 0
09:48:18.600083 IP xxx.xxx.xxx.xxx.38258 > 23.53.169.165.443: Flags [.], ack 153, win 343, options [nop,nop,TS val 24826829 ecr 297188830,nop,nop,sack 1 {184:185}], length 0
09:48:18.600132 IP xxx.xxx.xxx.xxx.38258 > 23.53.169.165.443: Flags [.], ack 185, win 343, options [nop,nop,TS val 24826829 ecr 297208776], length 0
09:48:18.617304 IP xxx.xxx.xxx.xxx.38259 > 23.53.169.165.443: Flags [F.], seq 3083, ack 185, win 343, options [nop,nop,TS val 24826830 ecr 297208775], length 0
09:48:18.625856 IP 23.53.169.165.443 > xxx.xxx.xxx.xxx.38259: Flags [R], seq 2416038766, win 0, length 0
^C
167 packets captured
194 packets received by filter
0 packets dropped by kernel

Old thread, but same issue for me.
Symptoms: Could not access the duckduckgo website. Also broke one of my Roku boxes (would not confirm internet access).

I left the MTU alone on the pppoe0 interface (1492), and added the mss setting (1452) to the pppoe0 AND the internal eth1 interfaces.

I did not add the setting to eth0 ( the phys interface for pppoe0).