On 2015-06-29 18:57, Tantilov, Emil S wrote:
>> -----Original Message-----
>> From: Christian Ruppert [mailto:id...@qasl.de]
>> Sent: Friday, June 26, 2015 12:34 PM
>> To: Tantilov, Emil S
>> Cc: e1000-de...@lists.sf.net
>> Subject: RE: [E1000-devel] ixgbe and using iptables/SYNPROXY causes 
>> random
>> system resets
>> 
>> On 2015-06-26 21:15, Tantilov, Emil S wrote:
>>>> -----Original Message-----
>>>> From: Christian Ruppert [mailto:id...@qasl.de]
>>>> Sent: Friday, June 26, 2015 8:43 AM
>>>> To: e1000-de...@lists.sf.net
>>>> Subject: [E1000-devel] ixgbe and using iptables/SYNPROXY causes 
>>>> random
>>>> system resets
>>>> 
>>>> Hi,
>>>> 
>>>> we have a setup of some E3's with X520 10GE NICs (more details 
>>>> below)
>>>> and we also use the iptables SYNPROXY[1][2] extension.
>>>> Details:
>>>> CPU: Different E3 Models
>>>> NICs: 8086:10fb Ethernet controller: Intel Corporation 82599EB
>>>> 10-Gigabit SFI/SFP+ Network Connection (rev 01) (X520-2 8086:0003)
>>>> Kernel: Currently a Debian Backports 3.16.0-4-amd64
>>> 
>>> Just so you know we do not support backported drivers.
>>> 
>>> If you are going to debug it - a trace from stable upstream
>>> kernel will be more useful to us than a trace from a Debian kernel.
>>> 
>>> Thanks,
>>> Emil
>> 
>> If I get anything useful at all you can get any kernel version you 
>> want :)
>> I also tried several vanilla version btw, up to 3.18.9 at this time.
> 
> If you can provide details about your test we may be able to attempt a 
> repro
> in our labs.
> 
> Thanks,
> Emil

What details in particular?

It seems like it can be any hardware but the NIC must be a X520 (the 
mentioned PCI ID/rev) and you must be using iptables >=1.4.21 and Kernel 
 >=3.12 because of the SYNPROXY extensions. You'll have to have at least the 
 >following iptables rules:
sysctl -w net.netfilter.nf_conntrack_tcp_loose=0

iptables -t raw -I PREROUTING -p tcp -m tcp --syn -j CT --notrack
iptables -I INPUT -p tcp -m tcp -m conntrack --ctstate INVALID,UNTRACKED 
-j SYNPROXY --sack-perm --timestamp --wscale 7 --mss 1460
iptables -A INPUT -m conntrack --ctstate INVALID -j DROP

Stuff that is IMHO rather not related:
net.ipv4.tcp_max_syn_backlog=2048
net.ipv4.ip_local_port_range=1024 65535
net.core.somaxconn=40960

net.ipv4.netfilter.ip_conntrack_max=17374463
net.netfilter.nf_conntrack_max=17374463

modprobe nf_conntrack hashsize=17374463

The system has a decent amount of memory as it also acts as a 
loadbalancer and some caches.
The traffic, as I said, is pretty common/usual, mostly HTTP(S) and some 
streaming stuff.

It sometimes just takes some seconds/minutes, sometimes hours and 
sometimes days or even weeks. There must be (IMHO) some kind of a 
trigger (special packet or so, remote DoS) which I wasn't able to figure 
out yet. Even doing tcpreplays and so forth did not trigger it.

-- 
Regards,
Christian Ruppert

------------------------------------------------------------------------------
Don't Limit Your Business. Reach for the Cloud.
GigeNET's Cloud Solutions provide you with the tools and support that
you need to offload your IT needs and focus on growing your business.
Configured For All Businesses. Start Your Cloud Today.
https://www.gigenetcloud.com/
_______________________________________________
E1000-devel mailing list
E1000-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/e1000-devel
To learn more about Intel® Ethernet, visit 
http://communities.intel.com/community/wired

Reply via email to