conntrack bug?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

While testing patches for IPVS, I found a strange behaviour of conntrack that 
happens on an unpatched kernel too (2.6.24.4). Given the following rules:

iptables -A FORWARD -p tcp -d 192.168.1.3 --dport 80 \
                    -m state --state NEW -j ACCEPT
iptables -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -P FORWARD DROP

And a network setup where replies from 192.168.1.3 don't go via the same 
machine - ie, they appear to be being dropped - the following conntrack entry 
appears when sending only an ACK packet to 192.168.1.3:

ipv4     2 tcp      6 431684 ESTABLISHED src=192.168.0.104 dst=192.168.1.3 
sport=12345 dport=80 packets=2 bytes=95 [UNREPLIED] src=192.168.1.3 
dst=192.168.0.104 sport=80 dport=12345 packets=0 bytes=0 mark=0 use=1

If a SYN has been sent the following state appears and no traffic (including 
an ACK) is allowed to pass:

ipv4     2 tcp      6 119 SYN_SENT src=192.168.0.104 dst=192.168.1.3 
sport=23456 dport=80 packets=1 bytes=50 [UNREPLIED] src=192.168.1.3 
dst=192.168.0.104 sport=80 dport=23456 packets=0 bytes=0 mark=0 use=1

I would think that behaviour to be correct, but an entry appearing when only 
an ACK packet has been sent seems wrong. Is it a bug or intentional?

-- 
Jason Stubbs <j.stubbs@xxxxxxxxxxxxxxx>
LINKTHINK INC.
東京都渋谷区桜ヶ丘町22-14 N.E.S S棟 3F
TEL 03-5728-4772  FAX 03-5728-4773
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux