Hi,

this is sort-of speculative, but it would surprised me if the gist of it wasn't 
correct:

conntrackd synchs firewall state, but it doesn't synch tcp state, and it can't 
do anything to haproxy to make a haproxy instance think it already has an 
established connection.

It's an interesting problem and maybe it can be done, but not with what we have 
right now, and this would also require changing or bypassing the tcp handling 
in the network stack of the OS. At least that's my expectation.

It surprises me that the download stalls and your backup haproxy doesn't send a 
RST - regardless of *firewall* state, tcp should react with an RST to packets 
from a completely unknown tcp session - but maybe you've set it up in some way 
that just leads to the packets being dropped silently?

(It works with normal / iptables based forwarding, like detailed in 
http://backreference.org/2013/04/03/firewall-ha-with-conntrackd-and-keepalived/ 
, because packets going through the forwarding never touch the actual tcp 
handling on the forwarder.)

Best,
Lukas

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to