dropped connections only on hispeed networks.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I'm trying to track down a rate throttling problem. The issue is that some clients are run into a problem when using FTP or SCP to transfer files some servers behind two different opensuse firewalls. At first I thought it was on my end and dismissed it because I have a crazy firewall config at home but when a client reported the same issue to his own FTP/SSH server which is on an entirely different firewall it seemed to no longer be coincidental. 

It seems that when people on very fast internet connections start transferring data it gets cut off. It happens on both FTP and SCP.

I have one firewall for my business related stuff on one IP subnet and another client has his on a different subnet. The firewalls are on a 100mb connection. These firewalls are virtualized with VMWare ESXI, with no rate limiting there.

What I'm trying to do is rule out iptables. I don't do any rate limiting on that. Does anyone know of anything inside iptables on opensuse that might make this situation happen?

I'm not ruling out the client, at they are all Windows Vista or Windows 7, nor am I ruling any possible firewall's that might be on the client side (I think they have a Linksys router).

Rules were built with fwbuilder and it seems to load some modules that aren't needed that could be part of the problem. 

So, can you eyeball the rules/modules and toss me any possible ideas why this might be happening?

# Generated by iptables-save v1.4.8 on Tue Jun 14 09:02:14 2011
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT DROP [0:0]
:RULE_9 - [0:0]
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -s 55.55.55.55/32 -p tcp -m tcp --dport 22 -m state --state NEW,ESTABLISHED -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type any -j ACCEPT
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -i eth1 -j ACCEPT
-A INPUT -d 200.200.200.94/32 -p tcp -m tcp -m multiport --dports 110,995,443,80,25,465,143,993,2525,3389,587,987 -j ACCEPT
-A INPUT -d 200.200.200.91/32 -p tcp -m tcp --dport 30031:30040 -j ACCEPT
-A INPUT -d 200.200.200.91/32 -p tcp -m tcp -m multiport --dports 3389,10011 -j ACCEPT
-A INPUT -d 200.200.200.91/32 -p udp -m udp --dport 9900:9999 -j ACCEPT
-A INPUT -d 200.200.200.93/32 -p tcp -m tcp --sport 20 --dport 1024:65535 -j ACCEPT
-A INPUT -d 200.200.200.93/32 -p tcp -m tcp -m multiport --dports 21,80,443 -j ACCEPT
-A INPUT -d 200.200.200.93/32 -p tcp -m tcp --dport 3389 -j ACCEPT
-A INPUT -j RULE_9
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -p icmp -m icmp --icmp-type any -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -p tcp -m tcp --dport 22 -j ACCEPT
-A FORWARD -i eth1 -j ACCEPT
-A FORWARD -o eth0 -j ACCEPT
-A FORWARD -d 200.200.200.94/32 -p tcp -m tcp -m multiport --dports 110,995,443,80,25,465,143,993,2525,3389,587,987 -j ACCEPT
-A FORWARD -d 10.20.0.2/32 -p tcp -m tcp -m multiport --dports 110,995,443,80,25,465,143,993,2525,3389,587,987 -j ACCEPT
-A FORWARD -d 200.200.200.91/32 -p tcp -m tcp --dport 30031:30040 -j ACCEPT
-A FORWARD -d 200.200.200.91/32 -p tcp -m tcp -m multiport --dports 3389,10011 -j ACCEPT
-A FORWARD -d 200.200.200.91/32 -p udp -m udp --dport 9900:9999 -j ACCEPT
-A FORWARD -d 10.20.0.13/32 -p tcp -m tcp --dport 30031:30040 -j ACCEPT
-A FORWARD -d 10.20.0.13/32 -p tcp -m tcp -m multiport --dports 3389,10011 -j ACCEPT
-A FORWARD -d 10.20.0.13/32 -p udp -m udp --dport 9900:9999 -j ACCEPT
-A FORWARD -d 200.200.200.93/32 -p tcp -m tcp --sport 20 --dport 1024:65535 -j ACCEPT
-A FORWARD -d 200.200.200.93/32 -p tcp -m tcp -m multiport --dports 21,80,443 -j ACCEPT
-A FORWARD -d 10.20.0.12/32 -p tcp -m tcp --sport 20 --dport 1024:65535 -j ACCEPT
-A FORWARD -d 10.20.0.12/32 -p tcp -m tcp -m multiport --dports 21,80,443 -j ACCEPT
-A FORWARD -d 200.200.200.93/32 -p tcp -m tcp --dport 3389 -j ACCEPT
-A FORWARD -d 10.20.0.11/32 -p tcp -m tcp --dport 3389 -j ACCEPT
-A FORWARD -j RULE_9
-A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -d 208.78.100.46/32 -p tcp -m tcp --sport 22 -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -p icmp -m icmp --icmp-type any -j ACCEPT
-A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -p tcp -m tcp --dport 22 -j ACCEPT
-A OUTPUT -o eth0 -j ACCEPT
-A OUTPUT -j RULE_9
-A RULE_9 -j LOG --log-prefix "RULE 9 -- REJECT " --log-level 6
-A RULE_9 -j REJECT --reject-with icmp-port-unreachable
COMMIT
# Completed on Tue Jun 14 09:02:14 2011
# Generated by iptables-save v1.4.8 on Tue Jun 14 09:02:14 2011
*nat
:PREROUTING ACCEPT [2120259:136842953]
:OUTPUT ACCEPT [253663:19171640]
:POSTROUTING ACCEPT [560604:36881225]
-A PREROUTING -d 200.200.200.94/32 -j DNAT --to-destination 10.20.0.2
-A PREROUTING -d 200.200.200.91/32 -p tcp -m tcp --dport 30031:30040 -j DNAT --to-destination 10.20.0.13
-A PREROUTING -d 200.200.200.91/32 -p tcp -m tcp -m multiport --dports 3389,10011 -j DNAT --to-destination 10.20.0.13
-A PREROUTING -d 200.200.200.91/32 -p udp -m udp --dport 9900:9999 -j DNAT --to-destination 10.20.0.13
-A PREROUTING -d 200.200.200.93/32 -p tcp -m tcp --dport 3389 -j DNAT --to-destination 10.20.0.11
-A PREROUTING -d 200.200.200.93/32 -j DNAT --to-destination 10.20.0.12
-A OUTPUT -d 200.200.200.94/32 -j DNAT --to-destination 10.20.0.2
-A OUTPUT -d 200.200.200.91/32 -p tcp -m tcp --dport 30031:30040 -j DNAT --to-destination 10.20.0.13
-A OUTPUT -d 200.200.200.91/32 -p tcp -m tcp -m multiport --dports 3389,10011 -j DNAT --to-destination 10.20.0.13
-A OUTPUT -d 200.200.200.91/32 -p udp -m udp --dport 9900:9999 -j DNAT --to-destination 10.20.0.13
-A OUTPUT -d 200.200.200.93/32 -p tcp -m tcp --dport 3389 -j DNAT --to-destination 10.20.0.11
-A OUTPUT -d 200.200.200.93/32 -j DNAT --to-destination 10.20.0.12
-A POSTROUTING -s 10.20.0.2/32 -o eth0 -j SNAT --to-source 200.200.200.94
-A POSTROUTING -s 10.20.0.13/32 -o eth0 -j SNAT --to-source 200.200.200.91
-A POSTROUTING -s 10.20.0.11/32 -o eth0 -j SNAT --to-source 200.200.200.93
-A POSTROUTING -s 10.20.0.12/32 -o eth0 -j SNAT --to-source 200.200.200.93
-A POSTROUTING -s 10.20.0.0/24 -o eth0 -j SNAT --to-source 200.200.200.90
COMMIT
# Completed on Tue Jun 14 09:02:14 2011


Module                  Size  Used by
vmsync                  3186  0
vmblock                11331  1
edd                     8720  0
mperf                   1255  0
ipt_REJECT              2152  1
ipt_LOG                 5119  1
xt_tcpudp               2107  34
xt_state                1162  8
xt_multiport            2666  11
iptable_filter          1418  1
ebt_dnat                1074  0
ebtable_nat             1631  0
ebtables               17205  1 ebtable_nat
ebt_snat                1138  0
act_nat                 3528  0
iptable_nat             5021  1
ip_tables              12172  2 iptable_filter,iptable_nat
nf_nat_h323             8343  0
nf_nat_proto_dccp       1127  0
nf_nat_ftp              1995  0
nf_nat_tftp              780  0
nf_nat_snmp_basic       8755  0
nf_nat_pptp             4326  0
nf_nat_proto_gre        2446  1 nf_nat_pptp
nf_nat_proto_sctp       1098  0
crc32c                  2615  1
libcrc32c                971  1 nf_nat_proto_sctp
nf_nat_proto_udplite     1078  0
nf_nat_sip              6298  0
nf_nat_amanda           1006  0
nf_nat_irc              1540  0
nf_nat                 21139  12 iptable_nat,nf_nat_h323,nf_nat_proto_dccp,nf_nat_ftp,nf_nat_tftp,nf_nat_pptp,nf_nat_proto_gre,nf_nat_proto_sctp,nf_nat_proto_udplite,nf_nat_sip,nf_nat_amanda,nf_nat_irc
nf_conntrack_irc        4645  1 nf_nat_irc
nf_conntrack_proto_dccp     7085  0
nf_conntrack_tftp       3888  1 nf_nat_tftp
nf_conntrack_slp        1407  0
ts_kmp                  1853  5
nf_conntrack_amanda     2345  1 nf_nat_amanda
nf_conntrack_ftp       10826  1 nf_nat_ftp
nf_conntrack_proto_sctp    10144  0
nf_conntrack_sip       21488  1 nf_nat_sip
nf_conntrack_netbios_ns     1382  0
nf_conntrack_sane       4521  0
xt_conntrack            2400  0
x_tables               17098  12 ipt_REJECT,ipt_LOG,xt_tcpudp,xt_state,xt_multiport,iptable_filter,ebt_dnat,ebtables,ebt_snat,iptable_nat,ip_tables,xt_conntrack
nf_conntrack_h323      61367  1 nf_nat_h323
nf_conntrack_proto_udplite     2906  0
nf_conntrack_netlink    17854  0
nfnetlink               3807  1 nf_conntrack_netlink
nf_conntrack_pptp      10275  1 nf_nat_pptp
nf_conntrack_proto_gre     6420  1 nf_conntrack_pptp
nf_conntrack_ipv6      18225  0
nf_conntrack_ipv4       8691  11 iptable_nat,nf_nat
nf_conntrack           75628  29 xt_state,iptable_nat,nf_nat_h323,nf_nat_ftp,nf_nat_tftp,nf_nat_snmp_basic,nf_nat_pptp,nf_nat_sip,nf_nat_amanda,nf_nat_irc,nf_nat,nf_conntrack_irc,nf_conntrack_proto_dccp,nf_conntrack_tftp,nf_conntrack_slp,nf_conntrack_amanda,nf_conntrack_ftp,nf_conntrack_proto_sctp,nf_conntrack_sip,nf_conntrack_netbios_ns,nf_conntrack_sane,xt_conntrack,nf_conntrack_h323,nf_conntrack_proto_udplite,nf_conntrack_netlink,nf_conntrack_pptp,nf_conntrack_proto_gre,nf_conntrack_ipv6,nf_conntrack_ipv4
nf_defrag_ipv4          1201  1 nf_conntrack_ipv4
loop                   14694  0
dm_mod                 73457  0
ppdev                   8444  0
parport_pc             33475  0
sg                     27872  0
sr_mod                 14671  0
parport                34052  2 ppdev,parport_pc
floppy                 57493  0
mptctl                 25570  0
cdrom                  38085  1 sr_mod
shpchp                 30104  0
intel_agp              27995  1
i2c_piix4              11574  0
pcspkr                  1614  0
vmware_balloon          6667  0
e1000                 107594  0
button                  5449  0
container               2535  0
ac                      3083  0
pci_hotplug            28749  1 shpchp
ext4                  365656  1
jbd2                   83102  1 ext4
crc16                   1403  1 ext4
fan                     3539  0
processor              40761  0
ata_generic             2743  0
mptspi                 13983  2
mptscsih               24578  1 mptspi
mptbase                67254  3 mptctl,mptspi,mptscsih
scsi_transport_spi     24136  1 mptspi
thermal                17357  0
thermal_sys            14678  3 fan,processor,thermal
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux