Re: TCP LAST ACK incorrectly treated as invalid

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks, Jozsef. Attached is the new packet capture and trace with patch applied.



On Wed, Oct 22, 2014 at 2:37 PM, Jozsef Kadlecsik
<kadlec@xxxxxxxxxxxxxxxxx> wrote:
> On Tue, 21 Oct 2014, vDev wrote:
>
>> I am unable to post a pcap file at this point but here is an ASCII
>> output. The last ACK (ID: 6200) was considered invalid due to III
>> evaluating to 0 and res=0 in the earlier trace.
>
> That cannot be the last ACK, because it's a FIN, ACK packet:
>
>>     Linux_Router.1026 > REMOTE_SERVER.63001: Flags [F.], cksum 0xf632
>> (correct), seq 31, ack 20, win 1500, length 0
>> 16:39:35.328857 IP (tos 0x0, ttl 52, id 6200, offset 0, flags [DF],
>> proto TCP (6), length 40)
>
> However, this is still not enough. The debug lines corresponding to the
> captured packets are required too. Moreover, previously there were packets
> skipping the window checking in the debug log, without enough debug data
> to identify them:
>
>> <7>[ 2238.870000] tcp_conntracks:
>> <7>[ 2238.870000] syn=0 ack=1 fin=0 rst=0 old=3 new=3
>> <7>[ 2238.870000] tcp_conntracks:
>> <7>[ 2238.870000] syn=0 ack=1 fin=1 rst=0 old=3 new=4
>
> So please apply this small patch, which adds the missing debug info:
>
> diff --git a/net/netfilter/nf_conntrack_proto_tcp.c b/net/netfilter/nf_conntrack_proto_tcp.c
> index 44d1ea3..655170f 100644
> --- a/net/netfilter/nf_conntrack_proto_tcp.c
> +++ b/net/netfilter/nf_conntrack_proto_tcp.c
> @@ -830,12 +830,16 @@ static int tcp_packet(struct nf_conn *ct,
>         th = skb_header_pointer(skb, dataoff, sizeof(_tcph), &_tcph);
>         BUG_ON(th == NULL);
>
> +       pr_debug("tcp_packet: ");
>         spin_lock_bh(&ct->lock);
>         old_state = ct->proto.tcp.state;
>         dir = CTINFO2DIR(ctinfo);
>         index = get_conntrack_index(th);
>         new_state = tcp_conntracks[dir][index][old_state];
>         tuple = &ct->tuplehash[dir].tuple;
> +       pr_debug("dir=%u, seq=%u ack=%u win=%u end=%u\n",
> +                dir, ntohl(th->seq), ntohl(th->ack_seq), ntohs(th->window),
> +                segment_seq_plus_len(ntohl(th->seq), skb->len, dataoff, th));
>
>         switch (new_state) {
>         case TCP_CONNTRACK_SYN_SENT:
>
>
> and send me the kernel debug messages and the tcpdump recording of the
> packet flow. If you must send the tcpdump in ascii, then print absolute
> and not relative TCP sequence numbers.
>
> At the moment the only thing I see about the packet flow is that the first
> reply packet answering the first FIN does not ack the FIN flag itself.
> However the TCP conntrack state table advances the state to CLOSE_WAIT,
> instead of keeping the FIN_WAIT state. But that's still not a problem
> in handling the next packets.
>
> Best regards,
> Jozsef
> -
> E-mail  : kadlec@xxxxxxxxxxxxxxxxx, kadlecsik.jozsef@xxxxxxxxxxxxx
> PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt
> Address : Wigner Research Centre for Physics, Hungarian Academy of Sciences
>           H-1525 Budapest 114, POB. 49, Hungary
root /tmp # tcpdump -n -XX -vv -S -i eth2 host Remote_Server
tcpdump: listening on eth2, link-type EN10MB (Ethernet), capture size 262144 bytes
16:20:20.820187 IP (tos 0x0, ttl 63, id 1628, offset 0, flags [none], proto TCP (6), length 44)
    Linux_Router.1039 > Remote_Server.63001: Flags [S], cksum 0xde22 (correct), seq 2561327104, win 1500, options [mss 536], length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  002c 065c 0000 3f06 1081 434e 77fb 0cb3  .,.\..?...CNw...
        0x0020:  9cf3 040f f619 98aa c000 0000 0000 6002  ..............`.
        0x0030:  05dc de22 0000 0204 0218                 ..."......
16:20:20.876252 IP (tos 0x0, ttl 52, id 0, offset 0, flags [DF], proto TCP (6), length 44)
    Remote_Server.63001 > Linux_Router.1039: Flags [S.], cksum 0x428b (correct), seq 3661860374, ack 2561327105, win 14600, options [mss 536], length 0
        0x0000:  0041 ac00 256a 001d b5cf 433d 0800 4500  .A..%j....C=..E.
        0x0010:  002c 0000 4000 3406 e1dc 0cb3 9cf3 434e  .,..@.4.......CN
        0x0020:  77fb f619 040f da43 8e16 98aa c001 6012  w......C......`.
        0x0030:  3908 428b 0000 0204 0218 0000            9.B.........
16:20:20.886805 IP (tos 0x0, ttl 63, id 1629, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [.], cksum 0x89d8 (correct), seq 2561327105, ack 3661860375, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 065d 0000 3f06 1084 434e 77fb 0cb3  .(.]..?...CNw...
        0x0020:  9cf3 040f f619 98aa c001 da43 8e17 5010  ...........C..P.
        0x0030:  05dc 89d8 0000                           ......
16:20:21.593340 IP (tos 0x0, ttl 63, id 1630, offset 0, flags [none], proto TCP (6), length 70)
    Linux_Router.1039 > Remote_Server.63001: Flags [P.], cksum 0xe81a (correct), seq 2561327105:2561327135, ack 3661860375, win 1500, length 30
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0046 065e 0000 3f06 1065 434e 77fb 0cb3  .F.^..?..eCNw...
        0x0020:  9cf3 040f f619 98aa c001 da43 8e17 5018  ...........C..P.
        0x0030:  05dc e81a 0000 024d 3533 3033 3130 3030  .......M53031000
        0x0040:  4c30 3030 3038 301c 4035 1c1c 1c1c 302e  L000080.@5....0.
        0x0050:  3030 2303                                00#.
16:20:21.652968 IP (tos 0x0, ttl 52, id 24150, offset 0, flags [DF], proto TCP (6), length 40)
    Remote_Server.63001 > Linux_Router.1039: Flags [.], cksum 0x568e (correct), seq 3661860375, ack 2561327135, win 14600, length 0
        0x0000:  0041 ac00 256a 001d b5cf 433d 0800 4500  .A..%j....C=..E.
        0x0010:  0028 5e56 4000 3406 838a 0cb3 9cf3 434e  .(^V@xxxxxxxxxxx
        0x0020:  77fb f619 040f da43 8e17 98aa c01f 5010  w......C......P.
        0x0030:  3908 568e 0000 0000 0000 0000            9.V.........
16:20:21.653394 IP (tos 0x0, ttl 52, id 24151, offset 0, flags [DF], proto TCP (6), length 58)
    Remote_Server.63001 > Linux_Router.1039: Flags [P.], cksum 0x5a3e (correct), seq 3661860375:3661860393, ack 2561327135, win 14600, length 18
        0x0000:  0041 ac00 256a 001d b5cf 433d 0800 4500  .A..%j....C=..E.
        0x0010:  003a 5e57 4000 3406 8377 0cb3 9cf3 434e  .:^W@xxxxxxxxxxx
        0x0020:  77fb f619 040f da43 8e17 98aa c01f 5018  w......C......P.
        0x0030:  3908 5a3e 0000 0245 5252 4f52 3a20 4241  9.Z>...ERROR:.BA
        0x0040:  4420 5343 414e 0339                      D.SCAN.9
16:20:21.653783 IP (tos 0x0, ttl 52, id 24152, offset 0, flags [DF], proto TCP (6), length 40)
    Remote_Server.63001 > Linux_Router.1039: Flags [F.], cksum 0x567b (correct), seq 3661860393, ack 2561327135, win 14600, length 0
        0x0000:  0041 ac00 256a 001d b5cf 433d 0800 4500  .A..%j....C=..E.
        0x0010:  0028 5e58 4000 3406 8388 0cb3 9cf3 434e  .(^X@xxxxxxxxxxx
        0x0020:  77fb f619 040f da43 8e29 98aa c01f 5011  w......C.)....P.
        0x0030:  3908 567b 0000 0000 0000 0000            9.V{........
16:20:21.664588 IP (tos 0x0, ttl 63, id 1631, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [.], cksum 0x89a8 (correct), seq 2561327135, ack 3661860393, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 065f 0000 3f06 1082 434e 77fb 0cb3  .(._..?...CNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e29 5010  ...........C.)P.
        0x0030:  05dc 89a8 0000                           ......
16:20:21.671235 IP (tos 0x0, ttl 63, id 1632, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 0660 0000 3f06 1081 434e 77fb 0cb3  .(.`..?...CNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:21.726839 IP (tos 0x0, ttl 52, id 24153, offset 0, flags [DF], proto TCP (6), length 40)
    Remote_Server.63001 > Linux_Router.1039: Flags [.], cksum 0x567a (correct), seq 3661860394, ack 2561327136, win 14600, length 0
        0x0000:  0041 ac00 256a 001d b5cf 433d 0800 4500  .A..%j....C=..E.
        0x0010:  0028 5e59 4000 3406 8387 0cb3 9cf3 434e  .(^Y@xxxxxxxxxxx
        0x0020:  77fb f619 040f da43 8e2a 98aa c020 5010  w......C.*....P.
        0x0030:  3908 567a 0000 0000 0000 0000            9.Vz........
16:20:21.727338 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [R], cksum 0xf7fc (correct), seq 2561327136, win 0, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 0000 4000 4006 d5e0 434e 77fb 0cb3  .(..@.@...CNw...
        0x0020:  9cf3 040f f619 98aa c020 0000 0000 5004  ..............P.
        0x0030:  0000 f7fc 0000                           ......
16:20:24.676125 IP (tos 0x0, ttl 63, id 1633, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 0661 0000 3f06 1080 434e 77fb 0cb3  .(.a..?...CNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:27.715963 IP (tos 0x0, ttl 63, id 1634, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 0662 0000 3f06 107f 434e 77fb 0cb3  .(.b..?...CNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:30.755758 IP (tos 0x0, ttl 63, id 1635, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 0663 0000 3f06 107e 434e 77fb 0cb3  .(.c..?..~CNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:33.795670 IP (tos 0x0, ttl 63, id 1636, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 0664 0000 3f06 107d 434e 77fb 0cb3  .(.d..?..}CNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:36.835543 IP (tos 0x0, ttl 63, id 1637, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 0665 0000 3f06 107c 434e 77fb 0cb3  .(.e..?..|CNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:39.875373 IP (tos 0x0, ttl 63, id 1638, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 0666 0000 3f06 107b 434e 77fb 0cb3  .(.f..?..{CNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:42.915207 IP (tos 0x0, ttl 63, id 1639, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 0667 0000 3f06 107a 434e 77fb 0cb3  .(.g..?..zCNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:45.955108 IP (tos 0x0, ttl 63, id 1641, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 0669 0000 3f06 1078 434e 77fb 0cb3  .(.i..?..xCNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:48.994909 IP (tos 0x0, ttl 63, id 1642, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 066a 0000 3f06 1077 434e 77fb 0cb3  .(.j..?..wCNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:52.034766 IP (tos 0x0, ttl 63, id 1643, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [F.], cksum 0x89a6 (correct), seq 2561327135, ack 3661860394, win 1500, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 066b 0000 3f06 1076 434e 77fb 0cb3  .(.k..?..vCNw...
        0x0020:  9cf3 040f f619 98aa c01f da43 8e2a 5011  ...........C.*P.
        0x0030:  05dc 89a6 0000                           ......
16:20:55.074560 IP (tos 0x0, ttl 63, id 1644, offset 0, flags [none], proto TCP (6), length 40)
    Linux_Router.1039 > Remote_Server.63001: Flags [R], cksum 0xbef5 (correct), seq 2561341735, win 0, length 0
        0x0000:  001d b5cf 433d 0041 ac00 256a 0800 4500  ....C=.A..%j..E.
        0x0010:  0028 066c 0000 3f06 1075 434e 77fb 0cb3  .(.l..?..uCNw...
        0x0020:  9cf3 040f f619 98aa f927 0000 0000 5004  .........'....P.
        0x0030:  0000 bef5 0000                           ......

22 packets captured
22 packets received by filter
0 packets dropped by kernel
root /tmp # dmesg 
0] device eth2 entered promiscuous mode
[  251.250000] tcp_new: sender end=2054078465 maxend=2054078465 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  251.250000] tcp_packet: 
[  251.250000] dir=0, seq=2054078464 ack=0 win=1500 end=2054078465
[  251.250000] tcp_in_window: START
[  251.250000] tcp_in_window: 
[  251.250000] seq=2054078464 ack=0+(0) sack=0+(0) win=1500 end=2054078465
[  251.250000] tcp_in_window: sender end=2054078465 maxend=2054078465 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  251.250000] tcp_in_window: 
[  251.250000] seq=2054078464 ack=0+(0) sack=0+(0) win=1500 end=2054078465
[  251.250000] tcp_in_window: sender end=2054078465 maxend=2054078465 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  251.250000] tcp_in_window: I=1 II=1 III=1 IV=1
[  251.250000] tcp_in_window: res=1 sender end=2054078465 maxend=2054078465 maxwin=1500 receiver end=0 maxend=1500 maxwin=0
[  251.250000] tcp_conntracks: 
[  251.250000] syn=1 ack=0 fin=0 rst=0 old=0 new=1
[  254.300000] tcp_new: sender end=2054078465 maxend=2054078465 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  254.300000] tcp_packet: 
[  254.300000] dir=0, seq=2054078464 ack=0 win=1500 end=2054078465
[  254.300000] tcp_in_window: START
[  254.300000] tcp_in_window: 
[  254.300000] seq=2054078464 ack=0+(0) sack=0+(0) win=1500 end=2054078465
[  254.300000] tcp_in_window: sender end=2054078465 maxend=2054078465 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  254.300000] tcp_in_window: 
[  254.300000] seq=2054078464 ack=0+(0) sack=0+(0) win=1500 end=2054078465
[  254.300000] tcp_in_window: sender end=2054078465 maxend=2054078465 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  254.300000] tcp_in_window: I=1 II=1 III=1 IV=1
[  254.300000] tcp_in_window: res=1 sender end=2054078465 maxend=2054078465 maxwin=1500 receiver end=0 maxend=1500 maxwin=0
[  254.300000] tcp_conntracks: 
[  254.300000] syn=1 ack=0 fin=0 rst=0 old=0 new=1
[  257.370000] tcp_new: sender end=2054078465 maxend=2054078465 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  257.370000] tcp_packet: 
[  257.370000] dir=0, seq=2054078464 ack=0 win=1500 end=2054078465
[  257.370000] tcp_in_window: START
[  257.370000] tcp_in_window: 
[  257.370000] seq=2054078464 ack=0+(0) sack=0+(0) win=1500 end=2054078465
[  257.370000] tcp_in_window: sender end=2054078465 maxend=2054078465 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  257.370000] tcp_in_window: 
[  257.370000] seq=2054078464 ack=0+(0) sack=0+(0) win=1500 end=2054078465
[  257.370000] tcp_in_window: sender end=2054078465 maxend=2054078465 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  257.370000] tcp_in_window: I=1 II=1 III=1 IV=1
[  257.370000] tcp_in_window: res=1 sender end=2054078465 maxend=2054078465 maxwin=1500 receiver end=0 maxend=1500 maxwin=0
[  257.370000] tcp_conntracks: 
[  257.370000] syn=1 ack=0 fin=0 rst=0 old=0 new=1
[  258.860000] device eth2 left promiscuous mode
[  260.430000] nf_ct_tcp: invalid new deleting.
[  283.400000] tcp_new: sender end=736947074 maxend=736947074 maxwin=8192 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  283.400000] tcp_packet: 
[  283.400000] dir=0, seq=736947073 ack=0 win=8192 end=736947074
[  283.400000] tcp_in_window: START
[  283.400000] tcp_in_window: 
[  283.400000] seq=736947073 ack=0+(0) sack=0+(0) win=8192 end=736947074
[  283.400000] tcp_in_window: sender end=736947074 maxend=736947074 maxwin=8192 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  283.400000] tcp_in_window: 
[  283.400000] seq=736947073 ack=0+(0) sack=0+(0) win=8192 end=736947074
[  283.400000] tcp_in_window: sender end=736947074 maxend=736947074 maxwin=8192 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  283.400000] tcp_in_window: I=1 II=1 III=1 IV=1
[  283.400000] tcp_in_window: res=1 sender end=736947074 maxend=736947074 maxwin=8192 receiver end=0 maxend=8192 maxwin=0
[  283.400000] tcp_conntracks: 
[  283.400000] syn=1 ack=0 fin=0 rst=0 old=0 new=1
[  283.400000] tcp_packet: 
[  283.400000] dir=1, seq=0 ack=736947074 win=0 end=0
[  283.400000] tcp_conntracks: 
[  283.400000] syn=0 ack=1 fin=0 rst=1 old=1 new=8
[  354.430000] console setup
[  368.820000] device eth2 entered promiscuous mode
[  376.100000] tcp_new: sender end=2561327105 maxend=2561327105 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  376.100000] tcp_packet: 
[  376.100000] dir=0, seq=2561327104 ack=0 win=1500 end=2561327105
[  376.100000] tcp_in_window: START
[  376.100000] tcp_in_window: 
[  376.100000] seq=2561327104 ack=0+(0) sack=0+(0) win=1500 end=2561327105
[  376.100000] tcp_in_window: sender end=2561327105 maxend=2561327105 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  376.100000] tcp_in_window: 
[  376.100000] seq=2561327104 ack=0+(0) sack=0+(0) win=1500 end=2561327105
[  376.100000] tcp_in_window: sender end=2561327105 maxend=2561327105 maxwin=1500 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  376.100000] tcp_in_window: I=1 II=1 III=1 IV=1
[  376.100000] tcp_in_window: res=1 sender end=2561327105 maxend=2561327105 maxwin=1500 receiver end=0 maxend=1500 maxwin=0
[  376.100000] tcp_conntracks: 
[  376.100000] syn=1 ack=0 fin=0 rst=0 old=0 new=1
[  376.160000] tcp_packet: 
[  376.160000] dir=1, seq=3661860374 ack=2561327105 win=14600 end=3661860375
[  376.160000] tcp_in_window: START
[  376.160000] tcp_in_window: 
[  376.160000] seq=3661860374 ack=2561327105+(0) sack=2561327105+(0) win=14600 end=3661860375
[  376.160000] tcp_in_window: sender end=0 maxend=1500 maxwin=0 scale=0 receiver end=2561327105 maxend=2561327105 maxwin=1500 scale=0
[  376.160000] tcp_in_window: 
[  376.160000] seq=3661860374 ack=2561327105+(0) sack=2561327105+(0) win=14600 end=3661860375
[  376.160000] tcp_in_window: sender end=3661860375 maxend=3661860375 maxwin=14600 scale=0 receiver end=2561327105 maxend=2561327105 maxwin=1500 scale=0
[  376.160000] tcp_in_window: I=1 II=1 III=1 IV=1
[  376.160000] tcp_in_window: res=1 sender end=3661860375 maxend=3661860375 maxwin=14600 receiver end=2561327105 maxend=2561341705 maxwin=1500
[  376.160000] tcp_conntracks: 
[  376.160000] syn=1 ack=1 fin=0 rst=0 old=1 new=2
[  376.170000] tcp_packet: 
[  376.170000] dir=0, seq=2561327105 ack=3661860375 win=1500 end=2561327105
[  376.170000] tcp_in_window: START
[  376.170000] tcp_in_window: 
[  376.170000] seq=2561327105 ack=3661860375+(0) sack=3661860375+(0) win=1500 end=2561327105
[  376.170000] tcp_in_window: sender end=2561327105 maxend=2561341705 maxwin=1500 scale=0 receiver end=3661860375 maxend=3661860375 maxwin=14600 scale=0
[  376.170000] tcp_in_window: 
[  376.170000] seq=2561327105 ack=3661860375+(0) sack=3661860375+(0) win=1500 end=2561327105
[  376.170000] tcp_in_window: sender end=2561327105 maxend=2561341705 maxwin=1500 scale=0 receiver end=3661860375 maxend=3661860375 maxwin=14600 scale=0
[  376.170000] tcp_in_window: I=1 II=1 III=1 IV=1
[  376.170000] tcp_in_window: res=1 sender end=2561327105 maxend=2561341705 maxwin=1500 receiver end=3661860375 maxend=3661861875 maxwin=14600
[  376.170000] tcp_conntracks: 
[  376.170000] syn=0 ack=1 fin=0 rst=0 old=2 new=3
[  376.880000] tcp_packet: 
[  376.880000] dir=0, seq=2561327105 ack=3661860375 win=1500 end=2561327135
[  376.880000] tcp_in_window: START
[  376.880000] tcp_in_window: 
[  376.880000] seq=2561327105 ack=3661860375+(0) sack=3661860375+(0) win=1500 end=2561327135
[  376.880000] tcp_in_window: sender end=2561327105 maxend=2561341705 maxwin=1500 scale=0 receiver end=3661860375 maxend=3661861875 maxwin=14600 scale=0
[  376.880000] tcp_in_window: 
[  376.880000] seq=2561327105 ack=3661860375+(0) sack=3661860375+(0) win=1500 end=2561327135
[  376.880000] tcp_in_window: sender end=2561327105 maxend=2561341705 maxwin=1500 scale=0 receiver end=3661860375 maxend=3661861875 maxwin=14600 scale=0
[  376.880000] tcp_in_window: I=1 II=1 III=1 IV=1
[  376.880000] tcp_in_window: res=1 sender end=2561327135 maxend=2561341705 maxwin=1500 receiver end=3661860375 maxend=3661861875 maxwin=14600
[  376.880000] tcp_conntracks: 
[  376.880000] syn=0 ack=1 fin=0 rst=0 old=3 new=3
[  376.950000] tcp_packet: 
[  376.950000] dir=1, seq=3661860375 ack=2561327135 win=14600 end=3661860375
[  376.950000] tcp_in_window: START
[  376.950000] tcp_in_window: 
[  376.950000] seq=3661860375 ack=2561327135+(0) sack=2561327135+(0) win=14600 end=3661860375
[  376.950000] tcp_in_window: sender end=3661860375 maxend=3661861875 maxwin=14600 scale=0 receiver end=2561327135 maxend=2561341705 maxwin=1500 scale=0
[  376.950000] tcp_in_window: 
[  376.950000] seq=3661860375 ack=2561327135+(0) sack=2561327135+(0) win=14600 end=3661860375
[  376.950000] tcp_in_window: sender end=3661860375 maxend=3661861875 maxwin=14600 scale=0 receiver end=2561327135 maxend=2561341705 maxwin=1500 scale=0
[  376.950000] tcp_in_window: I=1 II=1 III=1 IV=1
[  376.950000] tcp_in_window: res=1 sender end=3661860375 maxend=3661861875 maxwin=14600 receiver end=2561327135 maxend=2561341735 maxwin=1500
[  376.950000] tcp_conntracks: 
[  376.950000] syn=0 ack=1 fin=0 rst=0 old=3 new=3
[  376.950000] tcp_packet: 
[  376.950000] dir=1, seq=3661860375 ack=2561327135 win=14600 end=3661860393
[  376.950000] tcp_in_window: START
[  376.950000] tcp_in_window: 
[  376.950000] seq=3661860375 ack=2561327135+(0) sack=2561327135+(0) win=14600 end=3661860393
[  376.950000] tcp_in_window: sender end=3661860375 maxend=3661861875 maxwin=14600 scale=0 receiver end=2561327135 maxend=2561341735 maxwin=1500 scale=0
[  376.950000] tcp_in_window: 
[  376.950000] seq=3661860375 ack=2561327135+(0) sack=2561327135+(0) win=14600 end=3661860393
[  376.950000] tcp_in_window: sender end=3661860375 maxend=3661861875 maxwin=14600 scale=0 receiver end=2561327135 maxend=2561341735 maxwin=1500 scale=0
[  376.950000] tcp_in_window: I=1 II=1 III=1 IV=1
[  376.950000] tcp_in_window: res=1 sender end=3661860393 maxend=3661861875 maxwin=14600 receiver end=2561327135 maxend=2561341735 maxwin=1500
[  376.950000] tcp_conntracks: 
[  376.950000] syn=0 ack=1 fin=0 rst=0 old=3 new=3
[  376.950000] tcp_packet: 
[  376.950000] dir=1, seq=3661860393 ack=2561327135 win=14600 end=3661860394
[  376.950000] tcp_conntracks: 
[  376.950000] syn=0 ack=1 fin=1 rst=0 old=3 new=4
[  376.960000] tcp_packet: 
[  376.960000] dir=0, seq=2561327135 ack=3661860393 win=1500 end=2561327135
[  376.960000] tcp_in_window: START
[  376.960000] tcp_in_window: 
[  376.960000] seq=2561327135 ack=3661860393+(0) sack=3661860393+(0) win=1500 end=2561327135
[  376.960000] tcp_in_window: sender end=2561327135 maxend=2561341735 maxwin=1500 scale=0 receiver end=3661860393 maxend=3661861875 maxwin=14600 scale=0
[  376.960000] tcp_in_window: 
[  376.960000] seq=2561327135 ack=3661860393+(0) sack=3661860393+(0) win=1500 end=2561327135
[  376.960000] tcp_in_window: sender end=2561327135 maxend=2561341735 maxwin=1500 scale=0 receiver end=3661860393 maxend=3661861875 maxwin=14600 scale=0
[  376.960000] tcp_in_window: I=1 II=1 III=1 IV=1
[  376.960000] tcp_in_window: res=1 sender end=2561327135 maxend=2561341735 maxwin=1500 receiver end=3661860393 maxend=3661861893 maxwin=14600
[  376.960000] tcp_conntracks: 
[  376.960000] syn=0 ack=1 fin=0 rst=0 old=4 new=5
[  376.960000] tcp_packet: 
[  376.960000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  376.960000] tcp_conntracks: 
[  376.960000] syn=0 ack=1 fin=1 rst=0 old=5 new=6
[  377.020000] tcp_packet: 
[  377.020000] dir=1, seq=3661860394 ack=2561327136 win=14600 end=3661860394
[  377.020000] tcp_in_window: START
[  377.020000] tcp_in_window: 
[  377.020000] seq=3661860394 ack=2561327136+(0) sack=2561327136+(0) win=14600 end=3661860394
[  377.020000] tcp_in_window: sender end=3661860393 maxend=3661861893 maxwin=14600 scale=0 receiver end=2561327135 maxend=2561341735 maxwin=1500 scale=0
[  377.020000] tcp_in_window: 
[  377.020000] seq=3661860393 ack=2561327136+(0) sack=2561327136+(0) win=14600 end=3661860393
[  377.020000] tcp_in_window: sender end=3661860393 maxend=3661861893 maxwin=14600 scale=0 receiver end=2561327135 maxend=2561341735 maxwin=1500 scale=0
[  377.020000] tcp_in_window: I=1 II=1 III=0 IV=1
[  377.020000] tcp_in_window: res=0 sender end=3661860393 maxend=3661861893 maxwin=14600 receiver end=2561327135 maxend=2561341735 maxwin=1500
[  377.020000] nf_ct_tcp: invalid new deleting.
[  379.990000] tcp_packet: 
[  379.990000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  379.990000] tcp_conntracks: 
[  379.990000] syn=0 ack=1 fin=1 rst=0 old=6 new=6
[  383.060000] tcp_packet: 
[  383.060000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  383.060000] tcp_conntracks: 
[  383.060000] syn=0 ack=1 fin=1 rst=0 old=6 new=6
[  386.120000] tcp_packet: 
[  386.120000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  386.120000] tcp_conntracks: 
[  386.120000] syn=0 ack=1 fin=1 rst=0 old=6 new=6
[  389.190000] tcp_packet: 
[  389.190000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  389.190000] tcp_conntracks: 
[  389.190000] syn=0 ack=1 fin=1 rst=0 old=6 new=6
[  392.250000] tcp_packet: 
[  392.250000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  392.250000] tcp_conntracks: 
[  392.250000] syn=0 ack=1 fin=1 rst=0 old=6 new=6
[  395.310000] tcp_packet: 
[  395.310000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  395.310000] tcp_conntracks: 
[  395.310000] syn=0 ack=1 fin=1 rst=0 old=6 new=6
[  398.380000] tcp_packet: 
[  398.380000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  398.380000] tcp_conntracks: 
[  398.380000] syn=0 ack=1 fin=1 rst=0 old=6 new=6
[  401.440000] tcp_packet: 
[  401.440000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  401.440000] tcp_conntracks: 
[  401.440000] syn=0 ack=1 fin=1 rst=0 old=6 new=6
[  404.510000] tcp_packet: 
[  404.510000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  404.510000] tcp_conntracks: 
[  404.510000] syn=0 ack=1 fin=1 rst=0 old=6 new=6
[  407.570000] tcp_packet: 
[  407.570000] dir=0, seq=2561327135 ack=3661860394 win=1500 end=2561327136
[  407.570000] tcp_conntracks: 
[  407.570000] syn=0 ack=1 fin=1 rst=0 old=6 new=6
[  410.640000] tcp_packet: 
[  410.640000] dir=0, seq=2561341735 ack=0 win=0 end=2561341735
[  410.640000] tcp_conntracks: 
[  410.640000] syn=0 ack=0 fin=0 rst=1 old=6 new=8
[  416.860000] device eth2 left promiscuous mode
[  418.060000] tcp_new: sender end=499646465 maxend=499646465 maxwin=16384 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  418.060000] tcp_packet: 
[  418.060000] dir=0, seq=499646464 ack=0 win=16384 end=499646465
[  418.060000] tcp_in_window: START
[  418.060000] tcp_in_window: 
[  418.060000] seq=499646464 ack=0+(0) sack=0+(0) win=16384 end=499646465
[  418.060000] tcp_in_window: sender end=499646465 maxend=499646465 maxwin=16384 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  418.060000] tcp_in_window: 
[  418.060000] seq=499646464 ack=0+(0) sack=0+(0) win=16384 end=499646465
[  418.060000] tcp_in_window: sender end=499646465 maxend=499646465 maxwin=16384 scale=0 receiver end=0 maxend=0 maxwin=0 scale=0
[  418.060000] tcp_in_window: I=1 II=1 III=1 IV=1
[  418.060000] tcp_in_window: res=1 sender end=499646465 maxend=499646465 maxwin=16384 receiver end=0 maxend=16384 maxwin=0
[  418.060000] tcp_conntracks: 
[  418.060000] syn=1 ack=0 fin=0 rst=0 old=0 new=1
[  418.060000] tcp_packet: 
[  418.060000] dir=1, seq=0 ack=499646465 win=0 end=0
[  418.060000] tcp_conntracks: 
[  418.060000] syn=0 ack=1 fin=0 rst=1 old=1 new=8
root /tmp # 
 CTRL-A Z for help | 38400 8N1 | NOR | Minicom 2.2    | VT102 |      Offline                                                                             

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux