On Wed, 2003-11-05 at 07:30, Ted Kaczmarek wrote: > > Ah, just like the Checkpoint implementation. > So their is still no state tracking per say, but a hash table > based on SA/port DA/port, and a 180 second timer. <shrug> There's not a whole lot else you can do. Its the nature of UDP as well as many other transports. If the UDP based application has a defined header (like DNS), you could probably tighten this down with string matching, but that would depend on the app. > Doesn't 180 seconds seem a tad long? > I kinda vaguely remember Checkpoint default on this being 40 seconds. I can't confirm that iptables is 180 seconds for UDP (too lazy to look it up ;-) but I can tell you that I still see traffic getting blocked due to state table time outs. The most common occurrence I see is someone with a slow DNS that posts to a large mailing list. They get nailed with a flood of queries in order to verify their domain and sometimes the name server becomes slow to respond. I also see state table time outs due to slow game servers from time to time. > I remember being in a discussion with some developers on this and the > consensus was 30 second heartbeats ( strange, they almost always end up > with 30 second heartbeats for everything, hehe ). I doubt _every_ application does this and a firewall should work with the lowest common denominator. For example I've seen FW-1 and IOS break large FTP file transfers because the state table times out before the transfer is complete (thus killing the command session). Netfilter does not have that problem because it keeps state on established for 5 days. HTH, C