--=-63yppBsOBVW84NNl3UKm Content-Type: text/plain Content-Transfer-Encoding: quoted-printable On Wed, 2002-11-13 at 16:34, Doug Watson wrote: > Thank you for your prompt response. >=20 > If there really is a bug in ip_conntrack > that makes me unfortunately skiddish about=20 > continuing on with netfilter/iptables as a=20 > viable solution for my company. Yet it seems=20 > like many people have implemented this and have > not seen these types of problems. >=20 hmm... me neither > I have run the script that you sent me several times. > Attached is a sample output from it. I don't believe that > I am seeing anything too strange, but I do have 1 question. > in the following line which you will see in the attached file > what does the (policy ACCEPT 4 packets, 284 bytes) mean? > Chain OUTPUT (policy ACCEPT 4 packets, 284 bytes) >=20 It means that the default policy for the OUTPUT chain is to accept packets and that there have been 4 packets totalling 284 bytes tested against this chain. > Is that the total number of packets to traverse the OUTPUT=20 > chain or it he number of packets ACCEPTED by the policy for the=20 > OUTPUT chain? Or something else? >=20 As above ... > Thank you, > Doug Watson >=20 > -----Original Message----- > From: alex [mailto:alex@bennee.com] > Sent: Monday, November 11, 2002 6:19 PM > To: Doug Watson > Cc: 'netfilter@lists.netfilter.org' > Subject: Re: intermittent and unreliable behaviour with iptables > scripts >=20 >=20 > On Mon, 2002-11-11 at 17:25, Doug Watson wrote: > > However, I along with my test group of 5 "lucky" users began to see > > some > > intermittent and unreliable behavior when accessing the internet > > through > > this new firewall most notably when browsing the web.=20 > >=20 > > When browsing the web, web pages that normally would load very > quickly > > seem=20 > > to hang for an inconsistent amount of time, anywhere between 1 > second > > to 30 seconds or more > > before they would even begin to load or would at times never load at > > all as > > if the connection to the web was lost. >=20 > This sound familiar to my own woes with port forwarded connections. I > suspect a bug in ip_conntrack that somehow causes FORWARDED packets to > end up in the output chains. I've been trying to find out exactly when > this occurs and why (and certainly why my older script worked without > problems). >=20 > You could try a using a variation of this script to monitor your > connections "live" and see which rule starts dropping when you > experience your problems. Try using it with something like watch: >=20 > iptables -Z -t nat > iptables -Z > watch -n 5 -d ./dumpview >=20 > #!/bin/bash > # > # dumpview - try and see where the packets get dropped. > # > echo "DNAT Stuff" > iptables -nvL -t nat > echo "Dropped packets of normal chains" > iptables -nvL | egrep "Chain|DROP" > echo "Connections" > cat /proc/net/ip_conntrack | wc -l > echo "Web Connections" > cat /proc/net/ip_conntrack | grep "port=3D80"=20 >=20 > --=20 > alex <alex@bennee.com> > My own hacking haven --=20 --=-63yppBsOBVW84NNl3UKm Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQA90my1h1fuR/Bv+ygRApxvAJ0SHyn0077JAS9nL/fCGmNwItZSmQCgqk+x NMSayBa1/s0xniNLrWsuLTA= =drqi -----END PGP SIGNATURE----- --=-63yppBsOBVW84NNl3UKm--