Re: Unexpected (ct)state matching behaviour

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Anno domini 2011 Jan Engelhardt scripsit:

> On Tuesday 2011-06-07 23:10, Maximilian Wilhelm wrote:
> 
> >> not run the NF_IP6_PRI_CONNTRACK hook, and as such not track
> >> particular connections/packets delivered over a bridge.
> >> (Thus, all those pkts are classified as INVALID.)
> >
> >Well, I should have said that. I had these not deactivted before,
> >but had similar problems, but with the Nagios Remote Plugin Executer only.
> >
> >forward reject: IN=br0 OUT=br0 PHYSIN=dns01_eth0 PHYSOUT=mon_eth0 SRC=192.168.42.53 DST=192.168.42.70 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=5666 DPT=41662 WINDOW=0 RES=0x00 RST URGP=0 
> >forward reject: IN=br0 OUT=br0 PHYSIN=mail_eth0 PHYSOUT=mon_eth0 SRC=192.168.42.25 DST=192.168.42.70 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=5666 DPT=33300 WINDOW=0 RES=0x00 RST URGP=0 
> >forward reject: IN=br0 OUT=br0 PHYSIN=mail_eth0 PHYSOUT=mon_eth0 SRC=192.168.42.25 DST=192.168.42.70 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=5666 DPT=33300 WINDOW=0 RES=0x00 RST URGP=0 
> >forward reject: IN=br0 OUT=br0 PHYSIN=mail_eth0 PHYSOUT=mon_eth0 SRC=192.168.42.25 DST=192.168.42.70 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=5666 DPT=57854 WINDOW=0 RES=0x00 RST URGP=0 
> >forward reject: IN=br0 OUT=br0 PHYSIN=mail_eth0 PHYSOUT=mon_eth0 SRC=192.168.42.25 DST=192.168.42.70 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=5666 DPT=57854 WINDOW=0 RES=0x00 RST URGP=0 
> >forward reject: IN=br0 OUT=br0 PHYSIN=dns01_eth0 PHYSOUT=mon_eth0 SRC=192.168.42.53 DST=192.168.42.70 LEN=40 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=TCP SPT=5666 DPT=47357 WINDOW=0 RES=0x00 RST URGP=0 

> >Deactivate the hooks clearly fixed that problem, but after a while the
> >other one turned up. Any furher idea? :)

> Suggestion: Maximum number of CTs reached. Check dmesg for overflow
> warnings.

The only netfilter related thing which pops up in

zgrep -v '\(local\|forward\) reject' kern.log*

since the last reboot of the machine is:

| nf_conntrack version 0.5.0 (16384 buckets, 65536 max)
| CONFIG_NF_CT_ACCT is deprecated and will be removed soon. Please use
| nf_conntrack.acct=1 kernel parameter, acct=1 nf_conntrack module option or
| sysctl net.netfilter.nf_conntrack_acct=1 to enable it.

wc -l /proc/net/ip_conntrack reports 211 and my Munin graphs indicate
that this is the usual value, so I would assue that's not the problem
here?

Ciao
Max
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux