Windows 10: TCP / IP metric priority is reset at each restart

I have adjusted the metric in an interface used for VPN to be of lower priority (10) than my LAN (1). This works immediately and works correctly. Until a restart. Each reset resets the metric to 1, far from what I set before.
I tried it through GUI, powershell (Set-NetIPInterface), cmd (netsh), registration, they all turn out the same way, they work in the current session but they reset to 1 at each restart.

Windows 10

Monitoring – How to monitor HTTPS and TCP Load balancers in GCP

we are using HTTPS and TCP Load Balancer in Google Cloud Platform (GCP) and we want to monitor them (for example, with Stackdriver).

For us, a main criterion seems to be the amount of healthy backend services (which is also an identifier that is displayed on the GCP console as green or orange / red).

But unfortunately there is no metric like backend_service.count.

Is there any other metric or form that can be used for that type of monitoring?
Is it generally a good idea to monitor and alert based on the backend count? (maybe we miss something)

Thank you very much in advance
– Dominik

Send a function through tcp in python

Is it possible to send a function or even just code through TCP in Python?

(It is very possible that this question is ridiculous, I have no idea what I am doing)

Recorded tcp bundled Wirehark packages cannot establish a 3-step handshake with the tcp listener

I have a pcap file registered in wireshark, I use bittwist / bittwiste ( to alter MAC Addr, IP, source / destination TCP ports on that pcap, the server under test is ac # tcplistener, the client are the packages played from that pcap file by bittwist, but the 3-step link protocol is never successful, what happens is the following:

Client >> SYN

SYN / ACK << Server

Client >> RST (with a sequence number = 1 but the confirmation number is a huge number)

Instead of what should happen:

Client >> SYN

SYN / ACK << Server

Client >> ACK

It seems to me that the client decides to close the connection, but the client in my case are the reproduced packages, which simply does the following in the first 2 packages:

Client >> SYN

Client >> ACK

So, the question is why the third step is RST instead of ACK based on the pcap file?

nginx: how does a shared Unix socket work through a Docker volume compared to TCP?

I wonder how Docker manages a Unix socket when shared between containers and how it affects performance compared to just using TCP.

What I am trying to achieve is to configure docker-compose to build a php-fpm, nginx and mysql container and configure nginx to use fastcgi_pass to php-fpm via unix socket instead of TCP.

This is because I am implementing the set of containers in AWS ECS with Fargate. Since Fargate shares the same ENI in all containers, I cannot set my references to the host name of a specific container, but I can share a volume to share the php-fpm socket.

By the way, I know that I could configure nginx communication to php-fpm through TCP by using localhost in ECS and switching it to container links with docker-compose with the warning that I would need to use ECS based on EC2 (and not fargate ))

In addition to learning how Docker manages shared sockets, I want to know if there are problems with using the Unix socket in ECS. And if somehow the volume controller that Docker uses would affect performance.

networks – How to make OpenVPN use only TCP?

I use a VPS OVH as a VPN for protection against DDoS. When testing using UDP for the server> server tunnel, I noticed that when an attack triggers OVH VAC mitigation (cannot be disabled), traffic between the server and the client is interrupted. Which means that the OVH VAC system was treating my client's UDP traffic as an attacker and blocking it. I know this is the problem due to a publication of a different OVH client on the OVH website.

With that in mind, I changed the tunnel to TCP. But now, when the client connects to a game, I see that he is using UDP to connect to the real game. As predicted, when starting a load test (simulated DDoS attack) on the server, my client was disconnected from the game but not the actual VPN server.

TL; DR: I need my OpenVPN server to use ONLY TCP for game connections, the DNS seems to be fine. Although my client's tunnel is set to TCP, the server connects to the game through UDP. How do I make the server only use TCP on game connections?

ios: find the ipad application that sends TCP packets to another device on my network

I recently discovered that my iPad is sending tcp packets on port 8000 from time to time to an unrelated device on my network (which is a honeypot that detects suspicious network behavior).

How can I find out what that is doing? Is there a network analyzer at the iOS level? I couldn't find any of that.
Any ideas?

(*) I installed a raspberry pi with openCanary in my home network. openCanary is an open source honeypot that exposes different fake services and alerts you when something tries to connect to it, which supposedly should happen when an attacker tries to scan your network or something.

Is it possible to connect remotely to a c-lightning node with an exposed TCP port?

If you run a c-lightning node with EXPOSE_TCP set to True, it seems to me that it should be possible to connect to it remotely, as long as R-lightning's R-r is listening to all incoming traffic. (IP is set to

I tried the Docker configuration recommended in the readme file of c-lightning and when I use socat to connect directly from inside the Docker container, everything works without problems:

socat - UNIX-CONNECT: /home/simnet/.lightning/lightning-rpc

But when I try to use socat from the container host, the connection closes directly upon opening without any errors or anything:

socat - tcp: 14302

The ports seem to be correctly mapped>9835/tcp

I do not understand what I'm missing here. Is it even possible to connect remotely with this configuration? I have also read this question, and the answer suggests using socat inside the Docker container to connect the Unix socket to TCP, but it seems to me that EXPOSE_TCP it is meant to do exactly that natively.

java: what are the Edge cases for the next TCP server on Android that would fail?

I have created a TCP server thread that I want to continue running and saved in the IOT device listener, that is, the RFID reader.
Since I only have one client
Please check my code and give your help.

the public class TcpServerThread extends the thread {

static static end String TAG = "TcpServerThread";

private boolean run_ = true;
Flow of DataInputStream;
ServerSocket serverSocket;
Socket ClientSocket;

public TcpServerThread () {
Start(); // start the thread

public void run () {

Long loop_count = Long.valueOf (0);

byte[] inBytes = new byte[200];
int a = 1025;
Chain IP = MiscUtilities.getIpAccess ();
Log.d (TAG, "IP" + IP);
// creating a socket to listen to on a given port
try {
serverSocket = new ServerSocket (a);

} capture (IOException e) {
Log.d (TAG, "execute: [exception occured in creating the socket]"+ e.getLocalizedMessage ());

int input = 0;
while (run_) {

Log.d (TAG, "run (): start");
loop_count ++;
try {
while (serverSocket! = null) {
Log.d (TAG, "run (): running");
try {
// accepting the incoming socket connection request
long start = System.currentTimeMillis ();
clientSocket = serverSocket.accept ();
clientSocket.setKeepAlive (true);

if (clientSocket! = null) {
long established = (System.currentTimeMillis () - started);
Log.d (TAG, "[Connection made at]: "+ clientSocket.getRemoteSocketAddress () +" in mills: "+ established);

DataInputStream stream = new DataInputStream (clientSocket.getInputStream ());
DataOutputStream outToServer = new DataOutputStream (clientSocket.getOutputStream ());

while ((input = (inBytes))! = -1) {
Log.d (TAG, "Read size is" + entry);
Log.d (TAG, "Data is" + MiscUtilities.bytesToHex (inBytes));

outToServer.writeByte (10);



} capture (IOException e) {
Log.d (TAG, "IOexception occurred:" + e.getLocalizedMessage ());

} catch (exception e) {
Log.d (TAG, "EXCEPTION occurred:" + e.getLocalizedMessage ());


} catch (exception e) {
// we have to pay attention to the IllegalStateException cases
Log.d (TAG, "[Exception occured] : "+ e.getLocalizedMessage ());
MiscUtilities.handleSilentException (e);


try {
throw a new exception RuntimeException (TAG + "Crashed !!");
} catch (RuntimeException e) {
MiscUtilities.handleSilentException (e);

abort the public vacuum () {
run_ = false;
closeServer ();

public void closeServer () {

try {
serverSocket.close ();
clientSocket.close ();
stream.close ();
} catch (exception e) {
Log.d (TAG, "closeServer:" + e.getLocalizedMessage ());
} Finally {

Can anyone review my code and provide comments please?

Tor relay on port 9001 TCP

I execute netstat -t on my Linux terminal and I noticed a relay tor running on port 9001. I searched over the relay IP address in shodan and got a result that the address is from Russia, after that I "searched Google" and found some websites saying this It can be a malware, a Trojan or a spyware, nothing more. Can someone explain what can be? Is it really a Trojan or a spyware or is it normal?

OBS: When I perform netstat -t Any Tor or Tor Browser service is running. I also run sudo service to stop to confirm.