Re: ip_conntrack_tcp Errors

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 28 Jun 2004, Evgeni Vachkov wrote:

> The test software connects to the web server with 200 connections at a
> time to start with. When it receives the test data, it creates 210
> connections, then 220... ...and so forth until something wrong happens.

So this is the number of new connections created.

> The interesting fact is that most connections were in  TIME_WAIT from
> (/proc/net/ip_conntrack).

That is not problem. And the client may even reopen a connection in the
TIME_WAIT state.

> Doing a `wc -l /proc/net/ip_conntrack` returns a figure arround 25000,
> which is well below the ip_conntrack_max treshold.

That's not bad either.

> > Why are there so many SYN/ACK packets sent when there is already a
> > connection established trough the firewall between the same IP addresses
> > and same ports?
>
> I'd love to know this, too. The software Im using is based on ab (apache
> benchmark tool). I beleive ab is creating multiple separate connections,
> over which it is getting data from server and therefore simulating a
> large nimber of users.

Based on or it is ab itself?

> > > Jun 25 16:38:51 myserver kernel: ip_conntrack_tcp: INVALID: invalid SYN
> > > (ignored) SRC=172.30.4.200 DST=192.168.30.3 LEN=60 TOS=0x00 PREC=0x00
> > > TTL=64 ID=0 DF PROTO=TCP SPT=80 DPT=43226 SEQ=461046254 ACK=654564425
> > > WINDOW=5792 RES=0x00 ECE ACK SYN URGP=0 OPT
> > > (020405B40402080A2D5584DD106BFE1501030300)

The question still remains: where is the SYN packet for which this SYN/ACK
is sent as a reply? Could you run tcpdump on the interface of the firewall
connecting it to the client?

Best regards,
Jozsef
-
E-mail  : kadlec@xxxxxxxxxxxxxxxxx, kadlec@xxxxxxxxxxxxxxx
PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt
Address : KFKI Research Institute for Particle and Nuclear Physics
          H-1525 Budapest 114, POB. 49, Hungary



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux