Re: Delay in responding caused by netfilter ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On April 29, 2005 07:50 am, Jörg Harmuth wrote:
> Hi all,
>
> Situation:
>
> 2 independant servers, one running RH7.2, the other SuSE8.1, with the
> same symptoms. There is a delay between the TCP/IP habdshake and the
> server greeting of 26 seconds (SuSE) or 32 seconds respectively (RH).
> Indeed everything is working, but there is this delay. Some tcpdump:
>
> tcpdump -n -i bond1 'tcp[1] == 110 or tcp[3] == 110'
> tcpdump: listening on bond1

	This gets us the connection you are looking at, but drops anything else.  So 
-- we can't see things that MIGHT be going wrong.
>
> 13:25:24.835287 10.10.10.100.60719 > 81.169.151.156.110: S \
> 3714172130:3714172130(0) win 5840 <mss 1460,sackOK,timestamp \
> 335589204 0,nop,wscale 0> (DF) [tos 0x10]
>
> 13:25:24.879667 81.169.151.156.110 > 10.10.10.100.60719: S \
> 2643711030:2643711030(0) ack 3714172131 win 5792 <mss \
> 1460,sackOK,timestamp 17886154 335589204,nop,wscale 0> (DF)
>
> 13:25:24.879702 10.10.10.100.60719 > 81.169.151.156.110: . ack 1 win \
>     5840 <nop,nop,timestamp 335589209 17886154> (DF) [tos 0x10]
>
> 13:25:50.964202 81.169.151.156.110 > 10.10.10.100.60719: P 1:35(34) \
> ack  1 win 5792 <nop,nop,timestamp 17888762 335589209> (DF)
>
> 13:25:50.964224 10.10.10.100.60719 > 81.169.151.156.110: . ack 35 \
> win 5840 <nop,nop,timestamp 335591818 17888762> (DF) [tos 0x10]
>

I'm wondering if that pop3 server is trying to do an identd check on the 
connection that is getting *b0rked* with the firewall up.  Try that dump 
again and loosen the filter a tad.
	
> ...
>
> This seems to concern only services that are started by inetd, so I
> thought inetd would cause this delay. But when I empty the chains (only
> having a default policy of ACCEPT, nothing more) this delay vanishes and
> everything is working as expected.

	That might be part of the problem, but thing of what inetd/xinetd might be 
doing to authenticate the connection before they start the server.
>
> Complete ruleset:
>
> *filter
>
> :INPUT DROP [343:76556]
> :FORWARD DROP [0:0]
> :OUTPUT DROP [1648:107018]
>
> -A INPUT -i lo -j ACCEPT
> -A INPUT -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 22222 -m state --state NEW \
>    --tcp-flags SYN,RST,ACK SYN -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 443 -m state --state NEW \
>    --tcp-flags SYN,RST,ACK SYN -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 25 -m state --state NEW \
>    --tcp-flags SYN,RST,ACK SYN -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 110 -m state --state NEW \
>    --tcp-flags SYN,RST,ACK SYN -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 80 -m state --state NEW \
>    --tcp-flags SYN,RST,ACK SYN -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW \
>    --tcp-flags SYN,RST,ACK SYN -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 21 -m state --state NEW \
>    --tcp-flags SYN,RST,ACK SYN -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 990 -m state --state NEW \
>    --tcp-flags SYN,RST,ACK SYN  -j ACCEPT
> -A INPUT -p tcp -m tcp --dport 21000:21199 -m state \
>    --state NEW --tcp-flags SYN,RST,ACK SYN -j ACCEPT
> -A INPUT -p udp -m udp --dport 53 -j ACCEPT
> -A INPUT -p udp -m udp --dport 123 -j ACCEPT
> -A INPUT -p udp -m udp --sport 53 -j ACCEPT
> -A OUTPUT -o lo -j ACCEPT
> -A OUTPUT -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT
> -A OUTPUT -p udp -m udp --sport 123 -j ACCEPT
> -A OUTPUT -p udp -m udp --sport 53 -j ACCEPT
> -A OUTPUT -p udp -m udp --dport 53 -j ACCEPT
> COMMIT
>
> Nothing complicated in my eyes. I have absolutely no idea how this tiny
> ruleset can cause such delays or - at least - is involved in this.
>
> Any ideas are highly welcome.
>
> Thanks and have a nice time,
>
> Joerg



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux