Re: Understanding conntrack: Delete and manual readd of same entry possible?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Roman Fiedler wrote:
Thanks for the patch. When I've played with the same problem at home I've
guessed that it is something with sequence numbers and that setting tcp-liberal
in a netlink test application is a workaround for the DROP. But I did not
bring it to that point that I could create a clean patch because there were
still some loose ends. Perhaps someone could help me to fix some of these:

a) When conntrackd inserts the entries, does it set the liberal also? If yes,
is it correct, that a failover via conntrackd would disable sequence number
tracking for all existing entries?

Yes, this is the way it works by now, but it would be easy to make a patch not to disable it. I'm going to prepare one now that conntrack-tools 0.9.14 is out. I'll let you know, you may want to help me doing some testing.

b) Does the netlink api support sequence number parameters? If not, should it?

IIRC the kernel already supports it, but user-space support for libnetfilter_conntrack and conntrackd is still missing.

c) If the sequence numbers are not set by the conntrack utility, where do the
values in the kernel space come from? Are they all 0 or is it uninitialized
memory from user or kernel space?

Not sure what you mean. Currently, we are setting the IP_CT_TCP_FLAG_BE_LIBERAL flag so window tracking is disabled for entries created via ctnetlink.

I'm going to look into this so we may have it for the next conntrack-tools release.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux