Galen Johnson wrote:
> John Dalbec wrote:
> 
>> I sometimes get sendsize packets being dropped by iptables, presumably 
>> because the iptables connection tracking decided the UDP connection 
>> was closed.  This causes the estimates to take much longer because the 
>> first sendsize process gives up.  Has anyone found a solution to this?
>> Thanks,
>> John Dalbec
>>
> I am currently running amanda through an iptables based firewall with no 
> issues.  I'm using Slack 8.1.  Are you able to log the drops?
I'm using Red Hat 7.1, kernel 2.4.9-34 w/ReiserFS quota patches.

These dumps were to tape DailySet104.
The next tape Amanda expects to use is: DailySet105.


STATISTICS:
                           Total       Full      Daily
                         --------   --------   --------
Estimate Time (hrs:min)    1:00
                            ^^^^
Run Time (hrs:min)         1:23
Dump Time (hrs:min)        0:20       0:06       0:15
Output Size (meg)        4865.8     1339.5     3526.2
Original Size (meg)      4865.8     1339.5     3526.2
Avg Compressed Size (%)     --         --         --    (level:#disks ...)
Filesystems Dumped           23          3         20   (1:19 3:1)
Avg Dump Rate (k/s)      4098.2     4008.7     4133.3

Sep 12 00:45:32 mail03 kernel: INT_IN DROP 5 IN=eth0 OUT= 
MAC=00:02:55:58:9d:fa:00:02:55:7c:ff:52:08:00 SRC=150.134.10.202 
DST=150.134.10.203 LEN=304 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP 
SPT=10080 DPT=604 LEN=284
Sep 12 00:45:34 mail03 kernel: INT_IN DROP 5 IN=eth0 OUT= 
MAC=00:02:55:58:9d:fa:00:02:55:7c:fd:01:08:00 SRC=150.134.10.201 
DST=150.134.10.203 LEN=265 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP 
SPT=10080 DPT=604 LEN=245
Sep 12 00:45:42 mail03 kernel: INT_IN DROP 5 IN=eth0 OUT= 
MAC=00:02:55:58:9d:fa:00:02:55:7c:ff:52:08:00 SRC=150.134.10.202 
DST=150.134.10.203 LEN=304 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP 
SPT=10080 DPT=604 LEN=284
Sep 12 00:45:44 mail03 kernel: INT_IN DROP 5 IN=eth0 OUT= 
MAC=00:02:55:58:9d:fa:00:02:55:7c:fd:01:08:00 SRC=150.134.10.201 
DST=150.134.10.203 LEN=265 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP 
SPT=10080 DPT=604 LEN=245
Sep 12 00:45:52 mail03 kernel: INT_IN DROP 5 IN=eth0 OUT= 
MAC=00:02:55:58:9d:fa:00:02:55:7c:ff:52:08:00 SRC=150.134.10.202 
DST=150.134.10.203 LEN=304 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=UDP 
SPT=10080 DPT=604 LEN=284
... there are more, but you get the idea.

The connection tracking should be handling this.  If I have to hack my 
firewall to let these packets through I might as well be using ipchains.
Thanks,
John Dalbec

Reply via email to