Android TV app loses connection - disastronaut

Help and support for HDHomeRun DVR and HDHomeRun software for Windows 10, Mac, Android, XBox, etc.
disastronaut
Posts: 15
Joined: Thu Oct 27, 2022 8:49 am

Android TV app loses connection - disastronaut

Post by disastronaut »

After the recent firmware update, each of my devices can only keep connection to the HDHomeRun device for a maximum of 30 minutes. If it finds the device on the network at all. After clearing the Android app's cache, it can find the device and works for a few minutes; but then we see a "unable to play channel: communication error" which will not go away until we clear the cache again. Even clearing the cache can be hit or miss. Sometimes the app will take us to the "Recorded" section with no option for live TV. Other times after we see the "Communication error", we navigate back one step and see the list of shows in the "Discover" section, which leads us to believe there is a some kind of data being sent back. We didn't change any settings or the network configuration until a few days after the firmware upgrade when we started trying to fix the issue; so hopefully our network isn't the problem. Speaking of which, when looking at the list of devices on the network, the hdhomerun will occasionally pop in and out. None of this happened before the recent firmware upgrade.

Here's the list of troubleshooting steps we've tried so far with the same result:
  1. Turn off IPv6, restart Wi-Fi in Android TV, clear cache, start app
  2. Turn on IPv6, restart Wi-Fi in Android TV, clear cache, start app
  3. Restart router, start app
  4. Restart router, restart Wi-Fi in Android TV, clear cache, start app
  5. Restart router, restart network switch, start app
  6. Restart router, restart network switch, restart Wi-Fi in Android TV, clear cache, start app
  7. Connect to a different SSID, restart Wi-Fi in Android TV, clear cache, start app
  8. Check system log, change some settings in home DNS, restart Wi-Fi in Android TV, clear cache, start app
  9. Temporarily change DNS in Android to Cloudflare, restart Wi-Fi, clear cache, start app
The reason I started messing with the DNS is because I saw this line consistently in the system log:

Code: Select all

20231227-01:05:00 System: myhdhomerun_sync: webclient error (dns failed)
I didn't see anything related to silicondust or hdhomerun blocked on my network; so maybe it's on your side? If it helps, I have a Pi-hole attached to the router. Like I said in the list above, bypassing the Pi-hole didn't make a difference.

I've turned on Diagnostics. My device ID is 10804844 and the firmware version is 20231214.

If it helps, there was a communication error at 2:00 PM UTC and 12:50 AM UTC on December 28th.

It looks like a bunch of new trackers are being blocked by pi-hole. Any of the following domains below required by the guide server?
  • cdn.taboola.com
  • a.teads.tv
  • aamt.nbcnews.com
  • a.pub.network
  • aan.amazon.com
  • aax-us-east-retail-direct.amazon.com
  • aax-us-iad.amazon.com
Let me know if you need anything else.

jasonl
Silicondust
Posts: 16836
Joined: Sun Oct 28, 2007 9:23 pm
x 64

Re: Android TV app loses connection

Post by jasonl »

Do you have a way to get a Wireshark/tcpdump capture of the HDHomeRun doing the DNS lookup and failing? Port mirroring if you have a managed switch that can do it, or a PC with a couple network interfaces bridged together, one with the HDHomeRun plugged in and one going out to the rest of the network?

disastronaut
Posts: 15
Joined: Thu Oct 27, 2022 8:49 am

Re: Android TV app loses connection

Post by disastronaut »

I can post a tcpdump. The network switch is very basic and only really functions as a way to increase the number of wired connections. Not sure port mirroring would still be helpful in this case. I can try if needed but I haven't had to set up port mirroring before.

The communication error happened at 09:44AM UTC. Let me know if you need another tcpdump.

Code: Select all

09:45:22.748948 IP (tos 0x10, ttl 64, id 8373, offset 0, flags [DF], proto TCP (6), length 176)
    pi.hole.ssh > Snyder.local.52932: Flags [P.], cksum 0x8504 (incorrect -> 0x9ef4), seq 805340304:805340428, ack 1238854874, win 501, options [nop,nop,TS val 3662248311 ecr 533969285], length 124
09:45:22.921133 IP (tos 0x10, ttl 63, id 25557, offset 0, flags [DF], proto TCP (6), length 52)
    Snyder.local.52932 > pi.hole.ssh: Flags [.], cksum 0x8064 (correct), seq 1, ack 124, win 1709, options [nop,nop,TS val 533970204 ecr 3662248311], length 0
09:45:30.152215 IP (tos 0x0, ttl 1, id 1917, offset 0, flags [DF], proto UDP (17), length 799)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 771
09:45:30.152383 IP (tos 0x0, ttl 64, id 42123, offset 0, flags [DF], proto UDP (17), length 799)
    192.168.1.7.39234 > 255.255.255.255.1900: [udp sum ok] UDP, length 771
09:45:30.380284 IP (tos 0x0, ttl 255, id 14725, offset 0, flags [DF], proto UDP (17), length 68)
    192.168.1.135.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 PTR (QM)? _googlezone._tcp.local. (40)
09:45:30.380291 IP6 (flowlabel 0xa12dc, hlim 255, next-header UDP (17) payload length: 48) fe80::c50d:d6a8:60e8:89d9.mdns > ff02::fb.mdns: [udp sum ok] 0 PTR (QM)? _googlezone._tcp.local. (40)
09:45:30.380297 IP (tos 0x0, ttl 255, id 14726, offset 0, flags [DF], proto UDP (17), length 68)
    192.168.1.135.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 PTR (QM)? _googlecast._tcp.local. (40)
09:45:30.380303 IP6 (flowlabel 0xa12dc, hlim 255, next-header UDP (17) payload length: 48) fe80::c50d:d6a8:60e8:89d9.mdns > ff02::fb.mdns: [udp sum ok] 0 PTR (QM)? _googlecast._tcp.local. (40)
09:45:30.380609 IP (tos 0x0, ttl 255, id 14727, offset 0, flags [DF], proto UDP (17), length 238)
    192.168.1.135.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlezone._tcp.local. PTR 72786299-e694-50fc-4cbb-0508270cf236._googlezone._tcp.local. ar: 72786299-e694-50fc-4cbb-0508270cf236._googlezone._tcp.local. (Cache flush) TXT "id=D77EAC168A1DAE9F95478F8DAB19C702" "CGS", 72786299-e694-50fc-4cbb-0508270cf236._googlezone._tcp.local. (Cache flush) SRV 72786299-e694-50fc-4cbb-0508270cf236.local.:10001 600 0, 72786299-e694-50fc-4cbb-0508270cf236.local. (Cache flush) A 192.168.1.135 (210)
09:45:30.381895 IP (tos 0x0, ttl 255, id 14728, offset 0, flags [DF], proto UDP (17), length 408)
    192.168.1.135.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlecast._tcp.local. PTR SHIELD-Android-TV-72786299e69450fc4cbb0508270cf236._googlecast._tcp.local. ar: SHIELD-Android-TV-72786299e69450fc4cbb0508270cf236._googlecast._tcp.local. (Cache flush) TXT "id=72786299e69450fc4cbb0508270cf236" "cd=D77EAC168A1DAE9F95478F8DAB19C702" "rm=3355E58F159C5128" "ve=05" "md=SHIELD Android TV" "ic=/setup/icon.png" "fn=Family Room TV" "ca=463365" "st=0" "bs=FA8FA5BFD4B0" "nf=1" "rs=", SHIELD-Android-TV-72786299e69450fc4cbb0508270cf236._googlecast._tcp.local. (Cache flush) SRV 72786299-e694-50fc-4cbb-0508270cf236.local.:8009 0 0, 72786299-e694-50fc-4cbb-0508270cf236.local. (Cache flush) A 192.168.1.135 (380)
09:45:30.381902 IP6 (flowlabel 0xa12dc, hlim 255, next-header UDP (17) payload length: 230) fe80::c50d:d6a8:60e8:89d9.mdns > ff02::fb.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlezone._tcp.local. PTR 72786299-e694-50fc-4cbb-0508270cf236._googlezone._tcp.local. ar: 72786299-e694-50fc-4cbb-0508270cf236._googlezone._tcp.local. (Cache flush) TXT "id=D77EAC168A1DAE9F95478F8DAB19C702" "CGS", 72786299-e694-50fc-4cbb-0508270cf236._googlezone._tcp.local. (Cache flush) SRV 72786299-e694-50fc-4cbb-0508270cf236.local.:10001 600 0, 72786299-e694-50fc-4cbb-0508270cf236.local. (Cache flush) AAAA fe80::c50d:d6a8:60e8:89d9 (222)
09:45:30.381909 IP6 (flowlabel 0xa12dc, hlim 255, next-header UDP (17) payload length: 400) fe80::c50d:d6a8:60e8:89d9.mdns > ff02::fb.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlecast._tcp.local. PTR SHIELD-Android-TV-72786299e69450fc4cbb0508270cf236._googlecast._tcp.local. ar: SHIELD-Android-TV-72786299e69450fc4cbb0508270cf236._googlecast._tcp.local. (Cache flush) TXT "id=72786299e69450fc4cbb0508270cf236" "cd=D77EAC168A1DAE9F95478F8DAB19C702" "rm=3355E58F159C5128" "ve=05" "md=SHIELD Android TV" "ic=/setup/icon.png" "fn=Family Room TV" "ca=463365" "st=0" "bs=FA8FA5BFD4B0" "nf=1" "rs=", SHIELD-Android-TV-72786299e69450fc4cbb0508270cf236._googlecast._tcp.local. (Cache flush) SRV 72786299-e694-50fc-4cbb-0508270cf236.local.:8009 0 0, 72786299-e694-50fc-4cbb-0508270cf236.local. (Cache flush) AAAA fe80::c50d:d6a8:60e8:89d9 (392)
09:45:30.403482 IP (tos 0x0, ttl 1, id 1931, offset 0, flags [DF], proto UDP (17), length 852)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 824
09:45:30.403658 IP (tos 0x0, ttl 64, id 42132, offset 0, flags [DF], proto UDP (17), length 852)
    192.168.1.7.39234 > 255.255.255.255.1900: [udp sum ok] UDP, length 824
09:45:30.423037 IP (tos 0x0, ttl 255, id 27875, offset 0, flags [DF], proto UDP (17), length 238)
    192.168.1.128.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlezone._tcp.local. PTR 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. ar: 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. (Cache flush) TXT "id=481D0B842BCA817BCEDF811B75CDE6DC" "CGS", 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. (Cache flush) SRV 14d5b19b-2efa-3830-eef4-7080892f613a.local.:10001 0 0, 14d5b19b-2efa-3830-eef4-7080892f613a.local. (Cache flush) A 192.168.1.128 (210)
09:45:30.423043 IP6 (flowlabel 0x71a87, hlim 255, next-header UDP (17) payload length: 230) fe80::9069:d879:db6:e267.mdns > ff02::fb.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlezone._tcp.local. PTR 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. ar: 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. (Cache flush) TXT "id=481D0B842BCA817BCEDF811B75CDE6DC" "CGS", 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. (Cache flush) SRV 14d5b19b-2efa-3830-eef4-7080892f613a.local.:10001 0 0, 14d5b19b-2efa-3830-eef4-7080892f613a.local. (Cache flush) AAAA fe80::9069:d879:db6:e267 (222)
09:45:30.427678 IP (tos 0x0, ttl 255, id 63779, offset 0, flags [DF], proto UDP (17), length 238)
    192.168.1.139.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlezone._tcp.local. PTR e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe._googlezone._tcp.local. ar: e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe._googlezone._tcp.local. (Cache flush) TXT "id=9420F46154992F1209A25BD7652FA3D1" "CGS", e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe._googlezone._tcp.local. (Cache flush) SRV e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe.local.:10001 0 0, e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe.local. (Cache flush) A 192.168.1.139 (210)
09:45:30.427684 IP (tos 0x0, ttl 255, id 63780, offset 0, flags [DF], proto UDP (17), length 388)
    192.168.1.139.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlecast._tcp.local. PTR SHIELD-Android-TV-e2335f54a9b41d7d8b764bbc7ed94afe._googlecast._tcp.local. ar: SHIELD-Android-TV-e2335f54a9b41d7d8b764bbc7ed94afe._googlecast._tcp.local. (Cache flush) TXT "id=e2335f54a9b41d7d8b764bbc7ed94afe" "cd=9420F46154992F1209A25BD7652FA3D1" "rm=" "ve=05" "md=SHIELD Android TV" "ic=/setup/icon.png" "fn=Bedroom TV" "ca=463365" "st=0" "bs=FA8F8C988A03" "nf=1" "rs=", SHIELD-Android-TV-e2335f54a9b41d7d8b764bbc7ed94afe._googlecast._tcp.local. (Cache flush) SRV e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe.local.:8009 0 0, e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe.local. (Cache flush) A 192.168.1.139 (360)
09:45:30.427852 IP (tos 0x0, ttl 255, id 27876, offset 0, flags [DF], proto UDP (17), length 384)
    192.168.1.128.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlecast._tcp.local. PTR SHIELD-Android-TV-14d5b19b2efa3830eef47080892f613a._googlecast._tcp.local. ar: SHIELD-Android-TV-14d5b19b2efa3830eef47080892f613a._googlecast._tcp.local. (Cache flush) TXT "id=14d5b19b2efa3830eef47080892f613a" "cd=481D0B842BCA817BCEDF811B75CDE6DC" "rm=" "ve=05" "md=SHIELD Android TV" "ic=/setup/icon.png" "fn=SHIELD" "ca=463365" "st=0" "bs=FA8F206B73FA" "nf=1" "rs=", SHIELD-Android-TV-14d5b19b2efa3830eef47080892f613a._googlecast._tcp.local. (Cache flush) SRV 14d5b19b-2efa-3830-eef4-7080892f613a.local.:8009 0 0, 14d5b19b-2efa-3830-eef4-7080892f613a.local. (Cache flush) A 192.168.1.128 (356)
09:45:30.427858 IP6 (flowlabel 0x71a87, hlim 255, next-header UDP (17) payload length: 376) fe80::9069:d879:db6:e267.mdns > ff02::fb.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlecast._tcp.local. PTR SHIELD-Android-TV-14d5b19b2efa3830eef47080892f613a._googlecast._tcp.local. ar: SHIELD-Android-TV-14d5b19b2efa3830eef47080892f613a._googlecast._tcp.local. (Cache flush) TXT "id=14d5b19b2efa3830eef47080892f613a" "cd=481D0B842BCA817BCEDF811B75CDE6DC" "rm=" "ve=05" "md=SHIELD Android TV" "ic=/setup/icon.png" "fn=SHIELD" "ca=463365" "st=0" "bs=FA8F206B73FA" "nf=1" "rs=", SHIELD-Android-TV-14d5b19b2efa3830eef47080892f613a._googlecast._tcp.local. (Cache flush) SRV 14d5b19b-2efa-3830-eef4-7080892f613a.local.:8009 0 0, 14d5b19b-2efa-3830-eef4-7080892f613a.local. (Cache flush) AAAA fe80::9069:d879:db6:e267 (368)
09:45:30.659398 IP (tos 0x0, ttl 1, id 1941, offset 0, flags [DF], proto UDP (17), length 802)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 774
09:45:30.670376 IP (tos 0x0, ttl 64, id 42149, offset 0, flags [DF], proto UDP (17), length 802)
    192.168.1.7.39234 > 255.255.255.255.1900: [udp sum ok] UDP, length 774
09:45:30.913413 IP (tos 0x0, ttl 1, id 1948, offset 0, flags [DF], proto UDP (17), length 805)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 777
09:45:31.040117 IP (tos 0x0, ttl 64, id 59259, offset 0, flags [DF], proto UDP (17), length 74)
    pi.hole.48212 > 8.8.8.8.domain: [bad udp cksum 0xd2f6 -> 0x9b3c!] 57635+ PTR? 250.255.255.239.in-addr.arpa. (46)
09:45:31.067351 IP (tos 0x80, ttl 124, id 3227, offset 0, flags [none], proto UDP (17), length 131)
    8.8.8.8.domain > pi.hole.48212: [udp sum ok] 57635 NXDomain q: PTR? 250.255.255.239.in-addr.arpa. 0/1/0 ns: 239.in-addr.arpa. SOA sns.dns.icann.org. noc.dns.icann.org. 2022091207 7200 3600 604800 3600 (103)
09:45:31.155430 IP (tos 0x0, ttl 1, id 1958, offset 0, flags [DF], proto UDP (17), length 861)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 833
09:45:31.412402 IP (tos 0x0, ttl 1, id 1962, offset 0, flags [DF], proto UDP (17), length 854)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 826
09:45:31.665387 IP (tos 0x0, ttl 1, id 1968, offset 0, flags [DF], proto UDP (17), length 866)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 838
09:45:31.720318 IP (tos 0x0, ttl 64, id 19144, offset 0, flags [none], proto UDP (17), length 78)
    192.168.1.1.1377 > 192.168.1.255.netbios-ns: [udp sum ok] UDP, length 50
09:45:31.908419 IP (tos 0x0, ttl 1, id 1992, offset 0, flags [DF], proto UDP (17), length 866)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 838
09:45:32.070406 IP (tos 0x0, ttl 64, id 59301, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.40089 > 8.8.8.8.domain: [bad udp cksum 0xd2ee -> 0x62bd!] 5162+ PTR? 8.8.8.8.in-addr.arpa. (38)
09:45:32.085342 IP (tos 0x80, ttl 124, id 27299, offset 0, flags [none], proto UDP (17), length 66)
    8.8.8.8.domain > pi.hole.40089: [udp sum ok] 5162 ServFail q: PTR? 8.8.8.8.in-addr.arpa. 0/0/0 (38)
09:45:32.085663 IP (tos 0x0, ttl 64, id 59302, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.40089 > 8.8.8.8.domain: [bad udp cksum 0xd2ee -> 0x62bd!] 5162+ PTR? 8.8.8.8.in-addr.arpa. (38)
09:45:32.086033 IP (tos 0x0, ttl 64, id 42850, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.40089 > 8.8.4.4.domain: [bad udp cksum 0xceea -> 0x66c1!] 5162+ PTR? 8.8.8.8.in-addr.arpa. (38)
09:45:32.107334 IP (tos 0x80, ttl 124, id 13077, offset 0, flags [none], proto UDP (17), length 66)
    8.8.8.8.domain > pi.hole.40089: [udp sum ok] 5162 ServFail q: PTR? 8.8.8.8.in-addr.arpa. 0/0/0 (38)
09:45:32.107341 IP (tos 0x80, ttl 124, id 9372, offset 0, flags [none], proto UDP (17), length 66)
    8.8.4.4.domain > pi.hole.40089: [udp sum ok] 5162 ServFail q: PTR? 8.8.8.8.in-addr.arpa. 0/0/0 (38)
09:45:32.108923 IP (tos 0x0, ttl 64, id 59303, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.38672 > 8.8.8.8.domain: [bad udp cksum 0xd2ee -> 0xbbf7!] 49272+ PTR? 8.8.8.8.in-addr.arpa. (38)
09:45:32.140320 IP (tos 0x80, ttl 124, id 17134, offset 0, flags [none], proto UDP (17), length 66)
    8.8.8.8.domain > pi.hole.38672: [udp sum ok] 49272 ServFail q: PTR? 8.8.8.8.in-addr.arpa. 0/0/0 (38)
09:45:32.140617 IP (tos 0x0, ttl 64, id 59306, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.38672 > 8.8.8.8.domain: [bad udp cksum 0xd2ee -> 0xbbf7!] 49272+ PTR? 8.8.8.8.in-addr.arpa. (38)
09:45:32.140986 IP (tos 0x0, ttl 64, id 42855, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.38672 > 8.8.4.4.domain: [bad udp cksum 0xceea -> 0xbffb!] 49272+ PTR? 8.8.8.8.in-addr.arpa. (38)
09:45:32.162466 IP (tos 0x0, ttl 1, id 2016, offset 0, flags [DF], proto UDP (17), length 868)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 840
09:45:32.162475 IP (tos 0x80, ttl 124, id 63007, offset 0, flags [none], proto UDP (17), length 66)
    8.8.8.8.domain > pi.hole.38672: [udp sum ok] 49272 ServFail q: PTR? 8.8.8.8.in-addr.arpa. 0/0/0 (38)
09:45:32.173383 IP (tos 0x80, ttl 124, id 64530, offset 0, flags [none], proto UDP (17), length 66)
    8.8.4.4.domain > pi.hole.38672: [udp sum ok] 49272 ServFail q: PTR? 8.8.8.8.in-addr.arpa. 0/0/0 (38)
09:45:32.173563 IP (tos 0xc0, ttl 64, id 1566, offset 0, flags [none], proto ICMP (1), length 94)
    pi.hole > 8.8.4.4: ICMP pi.hole udp port 38672 unreachable, length 74
        IP (tos 0x80, ttl 124, id 64530, offset 0, flags [none], proto UDP (17), length 66)
    8.8.4.4.domain > pi.hole.38672: [udp sum ok] 49272 ServFail q: PTR? 8.8.8.8.in-addr.arpa. 0/0/0 (38)
09:45:32.415422 IP (tos 0x0, ttl 1, id 2020, offset 0, flags [DF], proto UDP (17), length 864)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 836
09:45:32.668425 IP (tos 0x0, ttl 1, id 2037, offset 0, flags [DF], proto UDP (17), length 869)
    192.168.1.7.39234 > 239.255.255.250.1900: [udp sum ok] UDP, length 841
09:45:33.110597 IP (tos 0x0, ttl 64, id 59316, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.54661 > 8.8.8.8.domain: [bad udp cksum 0xd2ee -> 0x5c13!] 57839+ PTR? 4.4.8.8.in-addr.arpa. (38)
09:45:33.141348 IP (tos 0x0, ttl 60, id 51655, offset 0, flags [none], proto UDP (17), length 66)
    8.8.8.8.domain > pi.hole.54661: [udp sum ok] 57839 ServFail q: PTR? 4.4.8.8.in-addr.arpa. 0/0/0 (38)
09:45:33.141657 IP (tos 0x0, ttl 64, id 59317, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.54661 > 8.8.8.8.domain: [bad udp cksum 0xd2ee -> 0x5c13!] 57839+ PTR? 4.4.8.8.in-addr.arpa. (38)
09:45:33.141990 IP (tos 0x0, ttl 64, id 42908, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.54661 > 8.8.4.4.domain: [bad udp cksum 0xceea -> 0x6017!] 57839+ PTR? 4.4.8.8.in-addr.arpa. (38)
09:45:33.163341 IP (tos 0x0, ttl 60, id 51656, offset 0, flags [none], proto UDP (17), length 66)
    8.8.8.8.domain > pi.hole.54661: [udp sum ok] 57839 ServFail q: PTR? 4.4.8.8.in-addr.arpa. 0/0/0 (38)
09:45:33.163348 IP (tos 0x80, ttl 124, id 27101, offset 0, flags [none], proto UDP (17), length 66)
    8.8.4.4.domain > pi.hole.54661: [udp sum ok] 57839 ServFail q: PTR? 4.4.8.8.in-addr.arpa. 0/0/0 (38)
09:45:33.164843 IP (tos 0x0, ttl 64, id 59318, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.48655 > 8.8.8.8.domain: [bad udp cksum 0xd2ee -> 0x2a3c!] 11069+ PTR? 4.4.8.8.in-addr.arpa. (38)
09:45:33.196348 IP (tos 0x0, ttl 60, id 8680, offset 0, flags [none], proto UDP (17), length 66)
    8.8.8.8.domain > pi.hole.48655: [udp sum ok] 11069 ServFail q: PTR? 4.4.8.8.in-addr.arpa. 0/0/0 (38)
09:45:33.196607 IP (tos 0x0, ttl 64, id 59319, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.48655 > 8.8.8.8.domain: [bad udp cksum 0xd2ee -> 0x2a3c!] 11069+ PTR? 4.4.8.8.in-addr.arpa. (38)
09:45:33.196904 IP (tos 0x0, ttl 64, id 42913, offset 0, flags [DF], proto UDP (17), length 66)
    pi.hole.48655 > 8.8.4.4.domain: [bad udp cksum 0xceea -> 0x2e40!] 11069+ PTR? 4.4.8.8.in-addr.arpa. (38)
09:45:33.218328 IP (tos 0x0, ttl 60, id 10655, offset 0, flags [none], proto UDP (17), length 66)
    8.8.8.8.domain > pi.hole.48655: [udp sum ok] 11069 ServFail q: PTR? 4.4.8.8.in-addr.arpa. 0/0/0 (38)
09:45:33.229338 IP (tos 0x80, ttl 124, id 62976, offset 0, flags [none], proto UDP (17), length 66)
    8.8.4.4.domain > pi.hole.48655: [udp sum ok] 11069 ServFail q: PTR? 4.4.8.8.in-addr.arpa. 0/0/0 (38)
09:45:33.229465 IP (tos 0xc0, ttl 64, id 1576, offset 0, flags [none], proto ICMP (1), length 94)
    pi.hole > 8.8.4.4: ICMP pi.hole udp port 48655 unreachable, length 74
        IP (tos 0x80, ttl 124, id 62976, offset 0, flags [none], proto UDP (17), length 66)
    8.8.4.4.domain > pi.hole.48655: [udp sum ok] 11069 ServFail q: PTR? 4.4.8.8.in-addr.arpa. 0/0/0 (38)
09:45:36.068816 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.1.1 tell pi.hole, length 28
09:45:36.071371 ARP, Ethernet (len 6), IPv4 (len 4), Reply 192.168.1.1 is-at 34:98:b5:56:2c:5c (oui Unknown), length 46
09:45:36.720956 IP (tos 0x0, ttl 2, id 18506, offset 0, flags [none], proto UDP (17), length 122)
    192.168.1.1.35439 > 239.255.255.250.1900: [udp sum ok] UDP, length 94
09:45:36.720963 IP (tos 0x0, ttl 1, id 13313, offset 0, flags [none], proto UDP (17), length 74)
    192.168.1.1.53736 > mdns.mcast.net.mdns: [udp sum ok] 22725 PTR (QU)? _services._dns-sd._udp.local. (46)
09:45:36.722773 IP (tos 0x0, ttl 1, id 13315, offset 0, flags [none], proto UDP (17), length 61)
    192.168.1.1.53736 > mdns.mcast.net.mdns: [udp sum ok] 22727 PTR (QU)? _adb._tcp.local. (33)
09:45:36.722783 IP (tos 0x0, ttl 1, id 13316, offset 0, flags [none], proto UDP (17), length 74)
    192.168.1.1.53736 > mdns.mcast.net.mdns: [udp sum ok] 22728 PTR (QU)? _nv_shield_remote._tcp.local. (46)
09:45:36.722789 IP (tos 0x0, ttl 1, id 13317, offset 0, flags [none], proto UDP (17), length 74)
    192.168.1.1.53736 > mdns.mcast.net.mdns: [udp sum ok] 22729 PTR (QU)? _androidtvremote2._tcp.local. (46)
09:45:36.776342 IP (tos 0x0, ttl 255, id 41350, offset 0, flags [DF], proto UDP (17), length 168)
    192.168.1.9.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 4/0/0 _services._dns-sd._udp.local. PTR _airplay._tcp.local., _services._dns-sd._udp.local. PTR _raop._tcp.local., _services._dns-sd._udp.local. PTR _spotify-connect._tcp.local., _services._dns-sd._udp.local. PTR _sonos._tcp.local. (140)
09:45:36.776349 IP (tos 0x0, ttl 1, id 13332, offset 0, flags [none], proto UDP (17), length 65)
    192.168.1.1.53736 > mdns.mcast.net.mdns: [udp sum ok] 22730 PTR (QU)? _airplay._tcp.local. (37)
09:45:36.776355 IP (tos 0x0, ttl 1, id 13333, offset 0, flags [none], proto UDP (17), length 62)
    192.168.1.1.53736 > mdns.mcast.net.mdns: [udp sum ok] 22731 PTR (QU)? _raop._tcp.local. (34)
09:45:36.776361 IP (tos 0x0, ttl 1, id 13334, offset 0, flags [none], proto UDP (17), length 73)
    192.168.1.1.53736 > mdns.mcast.net.mdns: [udp sum ok] 22732 PTR (QU)? _spotify-connect._tcp.local. (45)
09:45:36.776560 IP (tos 0x0, ttl 1, id 13335, offset 0, flags [none], proto UDP (17), length 63)
    192.168.1.1.53736 > mdns.mcast.net.mdns: [udp sum ok] 22733 PTR (QU)? _sonos._tcp.local. (35)
09:45:36.787390 IP6 (flowlabel 0xff594, hlim 255, next-header UDP (17) payload length: 148) fe80::4aa6:b8ff:febb:b8f9.mdns > ff02::fb.mdns: [udp sum ok] 0*- [0q] 4/0/0 _services._dns-sd._udp.local. PTR _airplay._tcp.local., _services._dns-sd._udp.local. PTR _raop._tcp.local., _services._dns-sd._udp.local. PTR _spotify-connect._tcp.local., _services._dns-sd._udp.local. PTR _sonos._tcp.local. (140)
09:45:36.847343 IP (tos 0x0, ttl 255, id 28419, offset 0, flags [DF], proto UDP (17), length 89)
    192.168.1.128.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/0 _androidtvremote2._tcp.local. PTR SHIELD._androidtvremote2._tcp.local. (61)
09:45:36.847349 IP6 (flowlabel 0x71a87, hlim 255, next-header UDP (17) payload length: 69) fe80::9069:d879:db6:e267.mdns > ff02::fb.mdns: [udp sum ok] 0*- [0q] 1/0/0 _androidtvremote2._tcp.local. PTR SHIELD._androidtvremote2._tcp.local. (61)
09:45:36.916676 IP (tos 0x0, ttl 255, id 41383, offset 0, flags [DF], proto UDP (17), length 243)
    192.168.1.9.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 4/0/0 _airplay._tcp.local. PTR Family Room._airplay._tcp.local., _raop._tcp.local. PTR 48A6B8BBB8F9@Family Room._raop._tcp.local., _spotify-connect._tcp.local. PTR sonosRINCON_48A6B8BBB8F901400._spotify-connect._tcp.local., _sonos._tcp.local. PTR Sonos-48A6B8BBB8F9@Family Room._sonos._tcp.local. (215)
09:45:36.916682 IP6 (flowlabel 0xff594, hlim 255, next-header UDP (17) payload length: 223) fe80::4aa6:b8ff:febb:b8f9.mdns > ff02::fb.mdns: [udp sum ok] 0*- [0q] 4/0/0 _airplay._tcp.local. PTR Family Room._airplay._tcp.local., _raop._tcp.local. PTR 48A6B8BBB8F9@Family Room._raop._tcp.local., _spotify-connect._tcp.local. PTR sonosRINCON_48A6B8BBB8F901400._spotify-connect._tcp.local., _sonos._tcp.local. PTR Sonos-48A6B8BBB8F9@Family Room._sonos._tcp.local. (215)
09:45:39.422006 IP (tos 0x0, ttl 1, id 27209, offset 0, flags [DF], proto UDP (17), length 799)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 771
09:45:39.422173 IP (tos 0x0, ttl 64, id 1461, offset 0, flags [DF], proto UDP (17), length 799)
    192.168.1.2.34118 > 255.255.255.255.1900: [udp sum ok] UDP, length 771
09:45:39.673816 IP (tos 0x0, ttl 1, id 27266, offset 0, flags [DF], proto UDP (17), length 852)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 824
09:45:39.673995 IP (tos 0x0, ttl 64, id 1480, offset 0, flags [DF], proto UDP (17), length 852)
    192.168.1.2.34118 > 255.255.255.255.1900: [udp sum ok] UDP, length 824
09:45:39.717406 IP (tos 0x0, ttl 255, id 64880, offset 0, flags [DF], proto UDP (17), length 105)
    192.168.1.139.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 SRV (QM)? 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. (77)
09:45:39.761430 IP (tos 0x0, ttl 255, id 28926, offset 0, flags [DF], proto UDP (17), length 172)
    192.168.1.128.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/1 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. (Cache flush) SRV 14d5b19b-2efa-3830-eef4-7080892f613a.local.:10001 0 0 ar: 14d5b19b-2efa-3830-eef4-7080892f613a.local. (Cache flush) A 192.168.1.128 (144)
09:45:39.893409 IP (tos 0x0, ttl 255, id 64882, offset 0, flags [DF], proto UDP (17), length 68)
    192.168.1.139.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 PTR (QM)? _googlezone._tcp.local. (40)
09:45:39.893416 IP (tos 0x0, ttl 255, id 64883, offset 0, flags [DF], proto UDP (17), length 238)
    192.168.1.139.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlezone._tcp.local. PTR e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe._googlezone._tcp.local. ar: e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe._googlezone._tcp.local. (Cache flush) TXT "id=9420F46154992F1209A25BD7652FA3D1" "CGS", e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe._googlezone._tcp.local. (Cache flush) SRV e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe.local.:10001 0 0, e2335f54-a9b4-1d7d-8b76-4bbc7ed94afe.local. (Cache flush) A 192.168.1.139 (210)
09:45:39.904407 IP (tos 0x0, ttl 255, id 15812, offset 0, flags [DF], proto UDP (17), length 238)
    192.168.1.135.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlezone._tcp.local. PTR 72786299-e694-50fc-4cbb-0508270cf236._googlezone._tcp.local. ar: 72786299-e694-50fc-4cbb-0508270cf236._googlezone._tcp.local. (Cache flush) TXT "id=D77EAC168A1DAE9F95478F8DAB19C702" "CGS", 72786299-e694-50fc-4cbb-0508270cf236._googlezone._tcp.local. (Cache flush) SRV 72786299-e694-50fc-4cbb-0508270cf236.local.:10001 600 0, 72786299-e694-50fc-4cbb-0508270cf236.local. (Cache flush) A 192.168.1.135 (210)
09:45:39.936681 IP (tos 0x0, ttl 1, id 27317, offset 0, flags [DF], proto UDP (17), length 802)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 774
09:45:39.936859 IP (tos 0x0, ttl 64, id 1485, offset 0, flags [DF], proto UDP (17), length 802)
    192.168.1.2.34118 > 255.255.255.255.1900: [udp sum ok] UDP, length 774
09:45:39.958403 IP (tos 0x0, ttl 255, id 28961, offset 0, flags [DF], proto UDP (17), length 238)
    192.168.1.128.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- [0q] 1/0/3 _googlezone._tcp.local. PTR 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. ar: 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. (Cache flush) TXT "id=481D0B842BCA817BCEDF811B75CDE6DC" "CGS", 14d5b19b-2efa-3830-eef4-7080892f613a._googlezone._tcp.local. (Cache flush) SRV 14d5b19b-2efa-3830-eef4-7080892f613a.local.:10001 0 0, 14d5b19b-2efa-3830-eef4-7080892f613a.local. (Cache flush) A 192.168.1.128 (210)
09:45:40.178509 IP (tos 0x0, ttl 1, id 27345, offset 0, flags [DF], proto UDP (17), length 805)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 777
09:45:40.431535 IP (tos 0x0, ttl 1, id 27350, offset 0, flags [DF], proto UDP (17), length 861)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 833
09:45:40.684505 IP (tos 0x0, ttl 1, id 27363, offset 0, flags [DF], proto UDP (17), length 854)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 826
09:45:40.937539 IP (tos 0x0, ttl 1, id 27424, offset 0, flags [DF], proto UDP (17), length 866)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 838
09:45:41.190503 IP (tos 0x0, ttl 1, id 27465, offset 0, flags [DF], proto UDP (17), length 866)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 838
09:45:41.443565 IP (tos 0x0, ttl 1, id 27473, offset 0, flags [DF], proto UDP (17), length 868)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 840
09:45:41.694590 IP (tos 0x0, ttl 1, id 27500, offset 0, flags [DF], proto UDP (17), length 864)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 836
09:45:41.694679 IP (tos 0x0, ttl 1, id 42112, offset 0, flags [DF], proto UDP (17), length 799)
    192.168.1.9.33639 > 239.255.255.250.1900: [udp sum ok] UDP, length 771
09:45:41.694807 IP (tos 0x0, ttl 64, id 38085, offset 0, flags [DF], proto UDP (17), length 799)
    192.168.1.9.33639 > 255.255.255.255.1900: [udp sum ok] UDP, length 771
09:45:41.938517 IP (tos 0x0, ttl 1, id 27531, offset 0, flags [DF], proto UDP (17), length 869)
    192.168.1.2.34118 > 239.255.255.250.1900: [udp sum ok] UDP, length 841
09:45:42.389462 IP (tos 0x0, ttl 128, id 65532, offset 0, flags [none], proto UDP (17), length 67)
    Snyder.local.60706 > pi.hole.domain: [udp sum ok] 26041+ A? BRW40490FACF7FE.local. (39)
09:45:42.392520 IP (tos 0x0, ttl 1, id 39258, offset 0, flags [none], proto UDP (17), length 67)
    Snyder.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:42.392528 IP6 (flowlabel 0x94651, hlim 1, next-header UDP (17) payload length: 47) fe80::60d3:ae28:bc3e:5dd2.mdns > ff02::fb.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:42.395372 IP (tos 0x0, ttl 64, id 7450, offset 0, flags [DF], proto UDP (17), length 67)
    pi.hole.domain > Snyder.local.60706: [bad udp cksum 0x84a2 -> 0x0654!] 26041 NXDomain q: A? BRW40490FACF7FE.local. 0/0/0 (39)
09:45:42.399897 IP (tos 0x0, ttl 64, id 39804, offset 0, flags [DF], proto UDP (17), length 67)
    SonosZP.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- q: A (QM)? BRW40490FACF7FE.local. 0/0/0 (39)
09:45:42.399905 IP (tos 0x0, ttl 1, id 39259, offset 0, flags [none], proto UDP (17), length 67)
    Snyder.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:42.399911 IP6 (flowlabel 0x94651, hlim 1, next-header UDP (17) payload length: 47) fe80::60d3:ae28:bc3e:5dd2.mdns > ff02::fb.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:42.400340 IP6 (flowlabel 0x8fd59, hlim 1, next-header UDP (17) payload length: 41) fe80::60d3:ae28:bc3e:5dd2.60021 > ff02::1:3.hostmon: [udp sum ok] UDP, length 33
09:45:42.400346 IP (tos 0x0, ttl 1, id 43688, offset 0, flags [none], proto UDP (17), length 61)
    Snyder.local.60021 > 224.0.0.252.hostmon: [udp sum ok] UDP, length 33
09:45:42.410431 IP (tos 0x0, ttl 64, id 39805, offset 0, flags [DF], proto UDP (17), length 67)
    SonosZP.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- q: A (QM)? BRW40490FACF7FE.local. 0/0/0 (39)
09:45:42.489589 IP (tos 0x0, ttl 64, id 59742, offset 0, flags [DF], proto UDP (17), length 118)
    pi.hole.45893 > 8.8.8.8.domain: [bad udp cksum 0xd322 -> 0x8244!] 33738+ PTR? 3.0.0.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa. (90)
09:45:42.520452 IP (tos 0x0, ttl 60, id 25103, offset 0, flags [none], proto UDP (17), length 182)
    8.8.8.8.domain > pi.hole.45893: [udp sum ok] 33738 NXDomain q: PTR? 3.0.0.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa. 0/1/0 ns: ip6.arpa. SOA b.ip6-servers.arpa. nstld.iana.org. 2022092037 1800 900 604800 3600 (154)
09:45:42.530181 IP (tos 0x0, ttl 64, id 59743, offset 0, flags [DF], proto UDP (17), length 70)
    pi.hole.49620 > 8.8.8.8.domain: [bad udp cksum 0xd2f2 -> 0x7063!] 30198+ PTR? 252.0.0.224.in-addr.arpa. (42)
09:45:42.553450 IP (tos 0x0, ttl 60, id 3001, offset 0, flags [none], proto UDP (17), length 127)
    8.8.8.8.domain > pi.hole.49620: [udp sum ok] 30198 NXDomain q: PTR? 252.0.0.224.in-addr.arpa. 0/1/0 ns: 224.in-addr.arpa. SOA sns.dns.icann.org. noc.dns.icann.org. 2023092388 7200 3600 604800 3600 (99)
09:45:42.815568 IP6 (flowlabel 0x8fd59, hlim 1, next-header UDP (17) payload length: 41) fe80::60d3:ae28:bc3e:5dd2.60021 > ff02::1:3.hostmon: [udp sum ok] UDP, length 33
09:45:42.815591 IP (tos 0x0, ttl 1, id 43689, offset 0, flags [none], proto UDP (17), length 61)
    Snyder.local.60021 > 224.0.0.252.hostmon: [udp sum ok] UDP, length 33
09:45:42.815597 IP (tos 0x0, ttl 128, id 63143, offset 0, flags [none], proto UDP (17), length 78)
    Snyder.local.netbios-ns > 192.168.1.255.netbios-ns: [udp sum ok] UDP, length 50
09:45:43.402863 IP (tos 0x0, ttl 1, id 39260, offset 0, flags [none], proto UDP (17), length 67)
    Snyder.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:43.402870 IP6 (flowlabel 0xf00d6, hlim 1, next-header UDP (17) payload length: 47) fe80::60d3:ae28:bc3e:5dd2.mdns > ff02::fb.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:43.413437 IP (tos 0x0, ttl 64, id 39855, offset 0, flags [DF], proto UDP (17), length 67)
    SonosZP.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- q: A (QM)? BRW40490FACF7FE.local. 0/0/0 (39)
09:45:43.600486 IP (tos 0x0, ttl 128, id 63144, offset 0, flags [none], proto UDP (17), length 78)
    Snyder.local.netbios-ns > 192.168.1.255.netbios-ns: [udp sum ok] UDP, length 50
09:45:44.337529 IP (tos 0x0, ttl 128, id 63145, offset 0, flags [none], proto UDP (17), length 78)
    Snyder.local.netbios-ns > 192.168.1.255.netbios-ns: [udp sum ok] UDP, length 50
09:45:45.102399 IP (tos 0x0, ttl 1, id 39261, offset 0, flags [none], proto UDP (17), length 67)
    Snyder.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:45.102407 IP6 (flowlabel 0x4bb5b, hlim 1, next-header UDP (17) payload length: 47) fe80::60d3:ae28:bc3e:5dd2.mdns > ff02::fb.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:45.102413 IP6 (flowlabel 0x7fd0d, hlim 1, next-header UDP (17) payload length: 41) fe80::60d3:ae28:bc3e:5dd2.56492 > ff02::1:3.hostmon: [udp sum ok] UDP, length 33
09:45:45.102419 IP (tos 0x0, ttl 1, id 43690, offset 0, flags [none], proto UDP (17), length 61)
    Snyder.local.56492 > 224.0.0.252.hostmon: [udp sum ok] UDP, length 33
09:45:45.102425 IP (tos 0x0, ttl 1, id 39262, offset 0, flags [none], proto UDP (17), length 67)
    Snyder.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:45.102716 IP6 (flowlabel 0x4bb5b, hlim 1, next-header UDP (17) payload length: 47) fe80::60d3:ae28:bc3e:5dd2.mdns > ff02::fb.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:45.113453 IP (tos 0x0, ttl 64, id 39904, offset 0, flags [DF], proto UDP (17), length 67)
    SonosZP.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- q: A (QM)? BRW40490FACF7FE.local. 0/0/0 (39)
09:45:45.113459 IP (tos 0x0, ttl 64, id 39905, offset 0, flags [DF], proto UDP (17), length 67)
    SonosZP.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- q: A (QM)? BRW40490FACF7FE.local. 0/0/0 (39)
09:45:45.528853 IP6 (flowlabel 0x7fd0d, hlim 1, next-header UDP (17) payload length: 41) fe80::60d3:ae28:bc3e:5dd2.56492 > ff02::1:3.hostmon: [udp sum ok] UDP, length 33
09:45:45.528860 IP (tos 0x0, ttl 1, id 43691, offset 0, flags [none], proto UDP (17), length 61)
    Snyder.local.56492 > 224.0.0.252.hostmon: [udp sum ok] UDP, length 33
09:45:45.528866 IP (tos 0x0, ttl 128, id 63146, offset 0, flags [none], proto UDP (17), length 78)
    Snyder.local.netbios-ns > 192.168.1.255.netbios-ns: [udp sum ok] UDP, length 50
09:45:46.117827 IP (tos 0x0, ttl 1, id 39263, offset 0, flags [none], proto UDP (17), length 67)
    Snyder.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:46.117835 IP6 (flowlabel 0x4bb5b, hlim 1, next-header UDP (17) payload length: 47) fe80::60d3:ae28:bc3e:5dd2.mdns > ff02::fb.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:46.117841 IP (tos 0x0, ttl 1, id 39264, offset 0, flags [none], proto UDP (17), length 67)
    Snyder.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:46.117846 IP6 (flowlabel 0x4bb5b, hlim 1, next-header UDP (17) payload length: 47) fe80::60d3:ae28:bc3e:5dd2.mdns > ff02::fb.mdns: [udp sum ok] 0 A (QM)? BRW40490FACF7FE.local. (39)
09:45:46.128504 IP (tos 0x0, ttl 64, id 39961, offset 0, flags [DF], proto UDP (17), length 67)
    SonosZP.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- q: A (QM)? BRW40490FACF7FE.local. 0/0/0 (39)
09:45:46.128510 IP (tos 0x0, ttl 64, id 39962, offset 0, flags [DF], proto UDP (17), length 67)
    SonosZP.local.mdns > mdns.mcast.net.mdns: [udp sum ok] 0*- q: A (QM)? BRW40490FACF7FE.local. 0/0/0 (39)
09:45:46.283492 IP (tos 0x0, ttl 128, id 63147, offset 0, flags [none], proto UDP (17), length 78)
    Snyder.local.netbios-ns > 192.168.1.255.netbios-ns: [udp sum ok] UDP, length 50
09:45:47.031511 IP (tos 0x0, ttl 128, id 63148, offset 0, flags [none], proto UDP (17), length 78)
    Snyder.local.netbios-ns > 192.168.1.255.netbios-ns: [udp sum ok] UDP, length 50
09:45:47.064459 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has pi.hole (b8:27:eb:76:36:ac (oui Unknown)) tell Snyder.local, length 46
09:45:47.064556 ARP, Ethernet (len 6), IPv4 (len 4), Reply pi.hole is-at b8:27:eb:76:36:ac (oui Unknown), length 28
09:45:47.428810 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has Snyder.local tell pi.hole, length 28
09:45:47.504483 ARP, Ethernet (len 6), IPv4 (len 4), Reply Snyder.local is-at 70:cf:49:75:02:38 (oui Unknown), length 46
09:45:47.713511 ARP, Ethernet (len 6), IPv4 (len 4), Request who-has Rest2ndGen-CD55C6.local tell Rest2ndGen-CD55C6.local, length 46

disastronaut
Posts: 15
Joined: Thu Oct 27, 2022 8:49 am

Re: Android TV app loses connection

Post by disastronaut »

Any chance the connection is being lost when trying to periodically contact the guide servers? I saw some logs in the tcpdump saying there was a "bad udp checksum" when trying a backup DNS.

jasonl
Silicondust
Posts: 16836
Joined: Sun Oct 28, 2007 9:23 pm
x 64

Re: Android TV app loses connection

Post by jasonl »

Need to get the capture of what's coming and going from the HDHomeRun, and it looks like this is what is coming and going from the pihole. Port mirroring allows another device to monitor everything coming and going from the HDHomeRun, because without it the switch only passes the traffic from the HDHomeRun out to the port that it needs to go to, not to the rest of the ports. If it's an unmanaged switch or otherwise doesn't support port mirroring, the other option is to use a computer with 2 interfaces bridged together to basically act as a man-in-the-middle and record the traffic at that point.

disastronaut
Posts: 15
Joined: Thu Oct 27, 2022 8:49 am

Re: Android TV app loses connection

Post by disastronaut »

Quick update: I saw in an old forum post where a user thought the network was the problem but it was actually a failing power cord. They didn't realize it was a problem until a system upgrade was needed and the HDHomerun restarted. I ordered one about a week ago and it should be here in a few days. If the issue persists, I'll set up the network bridge to record the traffic.

disastronaut
Posts: 15
Joined: Thu Oct 27, 2022 8:49 am

Re: Android TV app loses connection

Post by disastronaut »

New power cord didn't resolve the issue. Which is expected I guess. Kind of a shot in the dark anyhow. I'll try to figure out bridging the connections since the network switch is not managed.

disastronaut
Posts: 15
Joined: Thu Oct 27, 2022 8:49 am

Re: Android TV app loses connection - disastronaut

Post by disastronaut »

Also tried a new network cables but no luck. I'm having difficulty bridging the connections; so I tried Wireshark to watch network traffic on the hdhomerun. Here's the output from around when the connection error happened today:

Code: Select all

No.	Time	Source	Destination	Protocol	Length	Info
3033	390.486512	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
3049	392.229544	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
3051	392.229544	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
3060	393.253286	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
3062	393.253286	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
3143	404.398700	192.168.1.3	192.168.1.26	TCP	66	80 → 50203 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=32
3146	404.399076	192.168.1.3	192.168.1.26	TCP	60	1400 → 50205 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3158	404.401540	192.168.1.3	192.168.1.26	TCP	60	80 → 50203 [ACK] Seq=1 Ack=176 Win=30272 Len=0
3169	404.401651	192.168.1.3	192.168.1.26	TCP	309	80 → 50203 [PSH, ACK] Seq=1 Ack=176 Win=30272 Len=255 [TCP segment of a reassembled PDU]
3170	404.401651	192.168.1.3	192.168.1.26	TCP	60	[TCP Dup ACK 3158#1] 80 → 50203 [ACK] Seq=256 Ack=176 Win=30272 Len=0
3174	404.402753	192.168.1.3	192.168.1.26	TCP	1367	80 → 50203 [PSH, ACK] Seq=256 Ack=176 Win=30272 Len=1313 [TCP segment of a reassembled PDU]
3177	404.403846	192.168.1.3	192.168.1.26	TCP	313	80 → 50203 [PSH, ACK] Seq=1569 Ack=176 Win=30272 Len=259 [TCP segment of a reassembled PDU]
3187	404.413282	192.168.1.3	192.168.1.26	HTTP/XML	60	HTTP/1.1 200 OK 
3197	404.415175	192.168.1.3	192.168.1.26	TCP	60	80 → 50203 [ACK] Seq=1829 Ack=177 Win=30272 Len=0
3270	404.822519	192.168.1.3	192.168.1.26	UDP	775	53642 → 57562 Len=733
3271	404.825885	192.168.1.3	192.168.1.26	SSDP	318	HTTP/1.1 200 OK 
3273	404.900432	192.168.1.3	192.168.1.26	TCP	60	1400 → 50205 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3285	405.202934	192.168.1.3	192.168.1.26	SSDP	320	HTTP/1.1 200 OK 
3287	405.287169	192.168.1.3	192.168.1.26	TCP	66	80 → 50214 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=32
3290	405.289297	192.168.1.3	192.168.1.26	TCP	60	80 → 50214 [ACK] Seq=1 Ack=175 Win=30272 Len=0
3291	405.289524	192.168.1.3	192.168.1.26	TCP	250	80 → 50214 [PSH, ACK] Seq=1 Ack=175 Win=30272 Len=196 [TCP segment of a reassembled PDU]
3292	405.290200	192.168.1.3	192.168.1.26	TCP	1514	80 → 50214 [ACK] Seq=197 Ack=175 Win=30272 Len=1460 [TCP segment of a reassembled PDU]
3294	405.290409	192.168.1.3	192.168.1.26	TCP	108	80 → 50214 [PSH, ACK] Seq=1657 Ack=175 Win=30272 Len=54 [TCP segment of a reassembled PDU]
3295	405.292238	192.168.1.3	192.168.1.26	TCP	1028	80 → 50214 [PSH, ACK] Seq=1711 Ack=175 Win=30272 Len=974 [TCP segment of a reassembled PDU]
3297	405.300785	192.168.1.3	192.168.1.26	HTTP/XML	60	HTTP/1.1 200 OK 
3300	405.302977	192.168.1.3	192.168.1.26	TCP	60	80 → 50214 [ACK] Seq=2686 Ack=176 Win=30272 Len=0
3302	405.306002	192.168.1.3	192.168.1.26	TCP	66	80 → 50215 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=32
3305	405.308570	192.168.1.3	192.168.1.26	TCP	60	80 → 50215 [ACK] Seq=1 Ack=194 Win=30272 Len=0
3306	405.308570	192.168.1.3	192.168.1.26	TCP	250	80 → 50215 [PSH, ACK] Seq=1 Ack=194 Win=30272 Len=196 [TCP segment of a reassembled PDU]
3307	405.309906	192.168.1.3	192.168.1.26	TCP	1514	80 → 50215 [ACK] Seq=197 Ack=194 Win=30272 Len=1460 [TCP segment of a reassembled PDU]
3309	405.310109	192.168.1.3	192.168.1.26	TCP	108	80 → 50215 [PSH, ACK] Seq=1657 Ack=194 Win=30272 Len=54 [TCP segment of a reassembled PDU]
3310	405.312464	192.168.1.3	192.168.1.26	TCP	1028	80 → 50215 [PSH, ACK] Seq=1711 Ack=194 Win=30272 Len=974 [TCP segment of a reassembled PDU]
3312	405.319887	192.168.1.3	192.168.1.26	HTTP/XML	60	HTTP/1.1 200 OK 
3315	405.323784	192.168.1.3	192.168.1.26	TCP	60	80 → 50215 [ACK] Seq=2686 Ack=195 Win=30272 Len=0
3317	405.377340	192.168.1.3	192.168.1.26	TCP	66	80 → 50216 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=32
3320	405.380556	192.168.1.3	192.168.1.26	TCP	60	80 → 50216 [ACK] Seq=1 Ack=135 Win=30272 Len=0
3321	405.380659	192.168.1.3	192.168.1.26	TCP	261	80 → 50216 [PSH, ACK] Seq=1 Ack=135 Win=30272 Len=207 [TCP segment of a reassembled PDU]
3322	405.381085	192.168.1.3	192.168.1.26	TCP	1514	80 → 50216 [ACK] Seq=208 Ack=135 Win=30272 Len=1460 [TCP segment of a reassembled PDU]
3324	405.381422	192.168.1.3	192.168.1.26	TCP	2974	80 → 50216 [ACK] Seq=1668 Ack=135 Win=30272 Len=2920 [TCP segment of a reassembled PDU]
3326	405.383098	192.168.1.3	192.168.1.26	HTTP	296	HTTP/1.1 200 OK  (JPEG JFIF image)
3328	405.385399	192.168.1.3	192.168.1.26	TCP	60	80 → 50216 [FIN, ACK] Seq=4830 Ack=136 Win=30272 Len=0
3331	405.388927	192.168.1.3	192.168.1.26	TCP	66	80 → 50217 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=32
3334	405.391179	192.168.1.3	192.168.1.26	TCP	60	80 → 50217 [ACK] Seq=1 Ack=135 Win=30272 Len=0
3335	405.391179	192.168.1.3	192.168.1.26	TCP	261	80 → 50217 [PSH, ACK] Seq=1 Ack=135 Win=30272 Len=207 [TCP segment of a reassembled PDU]
3336	405.391545	192.168.1.3	192.168.1.26	TCP	1514	80 → 50217 [ACK] Seq=208 Ack=135 Win=30272 Len=1460 [TCP segment of a reassembled PDU]
3338	405.391757	192.168.1.3	192.168.1.26	TCP	2974	80 → 50217 [ACK] Seq=1668 Ack=135 Win=30272 Len=2920 [TCP segment of a reassembled PDU]
3340	405.392200	192.168.1.3	192.168.1.26	TCP	1514	80 → 50217 [ACK] Seq=4588 Ack=135 Win=30272 Len=1460 [TCP segment of a reassembled PDU]
3341	405.393616	192.168.1.3	192.168.1.26	HTTP	1273	HTTP/1.1 200 OK  (JPEG JFIF image)
3344	405.395496	192.168.1.3	192.168.1.26	TCP	60	80 → 50217 [FIN, ACK] Seq=7267 Ack=136 Win=30272 Len=0
3347	405.398188	192.168.1.3	192.168.1.26	TCP	66	80 → 50218 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=32
3358	405.400592	192.168.1.3	192.168.1.26	TCP	60	80 → 50218 [ACK] Seq=1 Ack=135 Win=30272 Len=0
3359	405.400870	192.168.1.3	192.168.1.26	TCP	260	80 → 50218 [PSH, ACK] Seq=1 Ack=135 Win=30272 Len=206 [TCP segment of a reassembled PDU]
3360	405.401956	192.168.1.3	192.168.1.26	TCP	1514	80 → 50218 [ACK] Seq=207 Ack=135 Win=30272 Len=1460 [TCP segment of a reassembled PDU]
3362	405.402321	192.168.1.3	192.168.1.26	TCP	1514	80 → 50218 [ACK] Seq=1667 Ack=135 Win=30272 Len=1460 [TCP segment of a reassembled PDU]
3363	405.403465	192.168.1.3	192.168.1.26	HTTP	691	HTTP/1.1 200 OK  (PNG)
3366	405.405082	192.168.1.3	192.168.1.26	TCP	60	80 → 50218 [FIN, ACK] Seq=3764 Ack=136 Win=30272 Len=0
3370	405.407072	192.168.1.3	192.168.1.26	TCP	60	1400 → 50205 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3371	405.407673	192.168.1.3	192.168.1.26	TCP	66	80 → 50219 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=32
3375	405.409334	192.168.1.3	192.168.1.26	TCP	60	80 → 50219 [ACK] Seq=1 Ack=135 Win=30272 Len=0
3376	405.409616	192.168.1.3	192.168.1.26	TCP	260	80 → 50219 [PSH, ACK] Seq=1 Ack=135 Win=30272 Len=206 [TCP segment of a reassembled PDU]
3377	405.410000	192.168.1.3	192.168.1.26	TCP	1514	80 → 50219 [ACK] Seq=207 Ack=135 Win=30272 Len=1460 [TCP segment of a reassembled PDU]
3381	405.410263	192.168.1.3	192.168.1.26	TCP	2974	80 → 50219 [ACK] Seq=1667 Ack=135 Win=30272 Len=2920 [TCP segment of a reassembled PDU]
3384	405.411731	192.168.1.3	192.168.1.26	HTTP	135	HTTP/1.1 200 OK  (PNG)
3386	405.413026	192.168.1.3	192.168.1.26	TCP	60	80 → 50219 [FIN, ACK] Seq=4668 Ack=136 Win=30272 Len=0
3389	405.419449	192.168.1.3	192.168.1.26	TCP	66	80 → 50220 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=32
3393	405.421513	192.168.1.3	192.168.1.26	TCP	60	80 → 50220 [ACK] Seq=1 Ack=204 Win=30272 Len=0
3394	405.421846	192.168.1.3	192.168.1.26	TCP	276	80 → 50220 [PSH, ACK] Seq=1 Ack=204 Win=30272 Len=222 [TCP segment of a reassembled PDU]
3395	405.422140	192.168.1.3	192.168.1.26	TCP	1514	80 → 50220 [ACK] Seq=223 Ack=204 Win=30272 Len=1460 [TCP segment of a reassembled PDU]
3397	405.422440	192.168.1.3	192.168.1.26	TCP	2974	80 → 50220 [ACK] Seq=1683 Ack=204 Win=30272 Len=2920 [TCP segment of a reassembled PDU]
3399	405.423555	192.168.1.3	192.168.1.26	HTTP/XML	282	HTTP/1.1 200 OK 
3401	405.426096	192.168.1.3	192.168.1.26	TCP	60	80 → 50220 [FIN, ACK] Seq=4831 Ack=205 Win=30272 Len=0
3436	405.915620	192.168.1.3	192.168.1.26	TCP	60	1400 → 50205 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3576	406.417442	192.168.1.3	192.168.1.26	TCP	60	1400 → 50205 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3582	406.450099	192.168.1.3	192.168.1.26	SSDP	320	HTTP/1.1 200 OK 
3599	407.208290	192.168.1.3	192.168.1.26	SSDP	318	HTTP/1.1 200 OK 
3669	407.755104	192.168.1.3	192.168.1.26	SSDP	318	HTTP/1.1 200 OK 
3672	407.783405	192.168.1.3	192.168.1.26	SSDP	320	HTTP/1.1 200 OK 
3674	407.836372	192.168.1.3	192.168.1.26	UDP	775	50062 → 57562 Len=733
3677	408.283812	192.168.1.3	192.168.1.26	TCP	66	80 → 50236 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=32
3680	408.285514	192.168.1.3	192.168.1.26	TCP	60	80 → 50236 [ACK] Seq=1 Ack=177 Win=30272 Len=0
3681	408.285725	192.168.1.3	192.168.1.26	TCP	309	80 → 50236 [PSH, ACK] Seq=1 Ack=177 Win=30272 Len=255 [TCP segment of a reassembled PDU]
3682	408.286249	192.168.1.3	192.168.1.26	TCP	741	80 → 50236 [PSH, ACK] Seq=256 Ack=177 Win=30272 Len=687 [TCP segment of a reassembled PDU]
3684	408.287466	192.168.1.3	192.168.1.26	TCP	939	80 → 50236 [PSH, ACK] Seq=943 Ack=177 Win=30272 Len=885 [TCP segment of a reassembled PDU]
3685	408.296568	192.168.1.3	192.168.1.26	HTTP/XML	60	HTTP/1.1 200 OK 
3688	408.298619	192.168.1.3	192.168.1.26	TCP	60	80 → 50236 [ACK] Seq=1829 Ack=178 Win=30272 Len=0
3692	408.846639	192.168.1.3	192.168.1.26	TCP	66	80 → 50237 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=32
3696	408.848419	192.168.1.3	192.168.1.26	TCP	60	80 → 50237 [ACK] Seq=1 Ack=176 Win=30272 Len=0
3854	409.839739	192.168.1.3	192.168.1.26	SSDP	318	HTTP/1.1 200 OK 
3858	410.147191	192.168.1.3	192.168.1.26	SSDP	320	HTTP/1.1 200 OK 
3876	410.650252	192.168.1.3	192.168.1.26	UDP	775	44951 → 57562 Len=733
3878	410.687295	192.168.1.3	192.168.1.26	TCP	54	80 → 50246 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3883	411.068490	192.168.1.3	192.168.1.26	SSDP	318	HTTP/1.1 200 OK 
3895	411.785384	192.168.1.3	192.168.1.26	SSDP	320	HTTP/1.1 200 OK 
3897	412.037002	192.168.1.3	192.168.1.26	SSDP	318	HTTP/1.1 200 OK 
3898	412.040243	192.168.1.3	192.168.1.26	TCP	54	80 → 50247 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3925	412.416631	192.168.1.3	192.168.1.26	TCP	54	80 → 50248 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3927	412.552841	192.168.1.3	192.168.1.26	TCP	54	80 → 50247 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3928	412.809422	192.168.1.3	192.168.1.26	SSDP	320	HTTP/1.1 200 OK 
3931	413.193380	192.168.1.3	192.168.1.26	TCP	54	80 → 50249 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
3935	413.707138	192.168.1.3	192.168.1.26	TCP	54	80 → 50249 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4044	414.213809	192.168.1.3	192.168.1.26	TCP	54	80 → 50249 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4046	414.651437	192.168.1.3	192.168.1.26	TCP	54	80 → 50257 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4048	414.720770	192.168.1.3	192.168.1.26	TCP	54	80 → 50249 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4061	415.162916	192.168.1.3	192.168.1.26	TCP	54	80 → 50257 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4070	415.226110	192.168.1.3	192.168.1.26	TCP	54	80 → 50249 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4089	415.684415	192.168.1.3	192.168.1.26	TCP	54	80 → 50257 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4093	416.196187	192.168.1.3	192.168.1.26	TCP	54	80 → 50257 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4104	416.718154	192.168.1.3	192.168.1.26	TCP	54	80 → 50257 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4208	424.999111	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4210	424.999111	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4226	426.018441	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4228	426.018441	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4245	427.596194	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4247	427.608102	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4276	428.683723	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4277	428.683723	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4476	440.561334	192.168.1.3	224.0.0.251	MDNS	102	Standard query response 0x0000 A 72786299-e694-50fc-4cbb-0508270cf236.local, "QM" question
4542	447.835815	192.168.1.3	224.0.0.251	MDNS	636	Standard query response 0x0000 PTR Sonos-48A6B8F9384E@Family Room._sonos._tcp.local TXT, cache flush SRV, cache flush 0 0 1443 Sonos-48A6B8F9384E.local A, cache flush 192.168.1.3 AAAA, cache flush fe80::4aa6:b8ff:fef9:384e NSEC, cache flush Sonos-48A6B8F9384E@Family Room._sonos._tcp.local NSEC, cache flush Sonos-48A6B8F9384E.local
4672	460.326602	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4674	460.326602	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4687	461.350509	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4688	461.350509	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4724	463.089523	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4725	463.089523	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4749	464.012488	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4750	464.012488	192.168.1.3	224.0.0.251	MDNS	81	Standard query response 0x0000 A BRW40490FACF7FE.local, "QM" question
4840	472.519503	192.168.1.3	239.255.255.250	SSDP	312	NOTIFY * HTTP/1.1 
4843	472.519503	192.168.1.3	239.255.255.250	SSDP	303	NOTIFY * HTTP/1.1 
4846	472.519503	192.168.1.3	239.255.255.250	SSDP	355	NOTIFY * HTTP/1.1 
4849	472.519503	192.168.1.3	239.255.255.250	SSDP	369	NOTIFY * HTTP/1.1 
4852	472.519503	192.168.1.3	239.255.255.250	SSDP	367	NOTIFY * HTTP/1.1 
4856	472.618399	192.168.1.3	239.255.255.250	SSDP	314	NOTIFY * HTTP/1.1 
4859	472.618399	192.168.1.3	239.255.255.250	SSDP	305	NOTIFY * HTTP/1.1 
4862	472.618399	192.168.1.3	239.255.255.250	SSDP	365	NOTIFY * HTTP/1.1 
4865	472.618399	192.168.1.3	239.255.255.250	SSDP	312	NOTIFY * HTTP/1.1 
4868	472.620877	192.168.1.3	239.255.255.250	SSDP	303	NOTIFY * HTTP/1.1 
4870	472.670933	192.168.1.3	192.168.1.26	TCP	54	80 → 50260 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4872	472.721523	192.168.1.3	239.255.255.250	SSDP	355	NOTIFY * HTTP/1.1 
4875	472.721523	192.168.1.3	239.255.255.250	SSDP	369	NOTIFY * HTTP/1.1 
4878	472.721523	192.168.1.3	239.255.255.250	SSDP	367	NOTIFY * HTTP/1.1 
4881	472.721523	192.168.1.3	239.255.255.250	SSDP	314	NOTIFY * HTTP/1.1 
4884	472.818459	192.168.1.3	239.255.255.250	SSDP	305	NOTIFY * HTTP/1.1 
4887	472.818459	192.168.1.3	239.255.255.250	SSDP	365	NOTIFY * HTTP/1.1 
4891	472.957117	192.168.1.3	192.168.1.26	TCP	54	80 → 50261 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4902	473.328647	192.168.1.3	192.168.1.26	TCP	54	80 → 50263 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4965	473.468292	192.168.1.3	192.168.1.26	TCP	54	80 → 50261 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4974	473.535009	192.168.1.3	192.168.1.26	TCP	54	80 → 50264 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4990	473.841588	192.168.1.3	192.168.1.26	TCP	54	80 → 50263 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4992	473.978329	192.168.1.3	192.168.1.26	TCP	54	80 → 50261 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
4994	474.041579	192.168.1.3	192.168.1.26	TCP	54	80 → 50264 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5002	474.355671	192.168.1.3	192.168.1.26	TCP	54	80 → 50263 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5010	474.502059	192.168.1.3	192.168.1.26	TCP	54	80 → 50261 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5012	474.565218	192.168.1.3	192.168.1.26	TCP	54	80 → 50264 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5014	474.866871	192.168.1.3	192.168.1.26	TCP	54	80 → 50263 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5016	475.020365	192.168.1.3	192.168.1.26	TCP	54	80 → 50261 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5018	475.082063	192.168.1.3	192.168.1.26	TCP	54	80 → 50264 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5020	475.265915	192.168.1.3	192.168.1.26	TCP	54	80 → 50265 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5022	475.382428	192.168.1.3	192.168.1.26	TCP	54	80 → 50263 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5024	475.516153	192.168.1.3	192.168.1.26	TCP	54	80 → 50266 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5026	475.600316	192.168.1.3	192.168.1.26	TCP	54	80 → 50264 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5028	475.776450	192.168.1.3	192.168.1.26	TCP	54	80 → 50265 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5030	476.029777	192.168.1.3	192.168.1.26	TCP	54	80 → 50266 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5032	476.295959	192.168.1.3	192.168.1.26	TCP	54	80 → 50265 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5034	476.550060	192.168.1.3	192.168.1.26	TCP	54	80 → 50266 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5043	476.816810	192.168.1.3	192.168.1.26	TCP	54	80 → 50265 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5045	477.066039	192.168.1.3	192.168.1.26	TCP	54	80 → 50266 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5048	477.335291	192.168.1.3	192.168.1.26	TCP	54	80 → 50265 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
5055	477.582547	192.168.1.3	192.168.1.26	TCP	54	80 → 50266 [RST, ACK] Seq=1 Ack=1 Win=0 Len=0
I have the diagnostic mode turned on too if that helps. Device ID is in the original post.

jasonl
Silicondust
Posts: 16836
Joined: Sun Oct 28, 2007 9:23 pm
x 64

Re: Android TV app loses connection - disastronaut

Post by jasonl »

What OS is running on the computer that you're trying to bridge the connections on? The text summary from Wireshark isn't really useful.

disastronaut
Posts: 15
Joined: Thu Oct 27, 2022 8:49 am

Re: Android TV app loses connection - disastronaut

Post by disastronaut »

Windows. The issue I'm running into is only having one network connection so there's nothing to bridge. Should I try to create some virtual network connections? Any other software or tools that could help? Sorry I'm not much help. Networking isn't my strong suit.

jasonl
Silicondust
Posts: 16836
Joined: Sun Oct 28, 2007 9:23 pm
x 64

Re: Android TV app loses connection - disastronaut

Post by jasonl »

You need a computer that has 2 network interfaces. Should work with wifi+ethernet, or onboard ethernet+USB ethernet, or something like that.

disastronaut
Posts: 15
Joined: Thu Oct 27, 2022 8:49 am

Re: Android TV app loses connection - disastronaut

Post by disastronaut »

I realized after posting that I could add another network connection with an adapter. Bridging Wi-Fi and and ethernet didn't work; so I'm going to buy another adapter to bridge the internet connection coming in with the connection going to the hdhomerun. Once that's done, I'll try bridging those two ethernet connections and exclude the Wi-Fi connection since that caused network problems. Thanks for your help and patience!

disastronaut
Posts: 15
Joined: Thu Oct 27, 2022 8:49 am

Re: Android TV app loses connection - disastronaut

Post by disastronaut »

I was able to set up a network bridge but wasn't able to connect to the hdhomerun on the network. That part is still a work in progress.

I've been trying hdhomerun on different devices and Android is the only platform I own having issues. Using hdhomerun on Windows and on an old Apple TV seem to work fine but Android throws the communication error consistently. Even after upgrading to the new Android TV version.

Hopefully I can figure out how to bridge the two connections and see the logs as the error is being thrown.

jasonl
Silicondust
Posts: 16836
Joined: Sun Oct 28, 2007 9:23 pm
x 64

Re: Android TV app loses connection - disastronaut

Post by jasonl »

Start menu > search for and open Control Panel. Set the view to Small icons, then open Network and Sharing Center. Click Change adapter settings on the left. Highlight the 2 interfaces, right click on one, and choose Bridge Connections. This will create the bridge, and the HDHomeRun should pick up an IP on your main network and be accessible to everything, and you can point WireShark at it and it will be able to see everything coming and going.

disastronaut
Posts: 15
Joined: Thu Oct 27, 2022 8:49 am

Re: Android TV app loses connection - disastronaut

Post by disastronaut »

Thanks for the steps for creating a network bridge! I was able to figure that part out already but was receiving an error during the creation of the network bridge. If anyone else reading this sees an error saying "An unexpected error occurred when configuring the network bridge" (very descriptive error), try removing one of the connections from the bridge and then adding that same connection back to the bridge; but don't remove the bridge entirely.

I have wireshark watching the network bridge but now the communication error is playing hard to get. Which is a good thing but bad for troubleshooting. Now the HDHomerun can go hours without an error. I wonder if having the HDHomerun on different internet source solved some sort of feedback loop in the switch. Or a successful phone home to the guide servers was needed? I'm basically spitballing trying to figure out why it's working all of a sudden. If the device(s) continue working then I'll reply again saying to close the ticket.

Post Reply