Hello,
we've just upgraded to v4.1.8 (592), and are still seeing what seem
to be state table related issues. This is an ISP DNS server, and
behaviour seems to be traffic-related. What we're seeing is dns traffic
being blocked (but not logged this time as we saw with 3.4.31.
Also, I was wondering if 50% usage of the state table was high, and if
we'd want to recompile with more buckets.
# ipfstat -s
IP states added:
3155 TCP
623165 UDP
883 ICMP
5119011 hits
2533514 misses
107994 maximum
0 no memory
647 max bucket
107994 maximum
0 no memory
2867 bkts in use
6637 active
0 expired
775 closed
State logging enabled
State table bucket statistics:
2867 in use
49.97% bucket usage
0 minimal length
12 maximal length
2.315 average length
I'm also wondering if the state table might be filling up because of
incorrect state handling on our rules:
######################################################################
# Initial ipf.conf
# generated during jumpstart at Thu Sep 16 16:22:44 MDT 2004
#
# To reload the filters, run ipf -Fa -f /etc/opt/ipf/ipf.conf
# let loopback run free
pass in quick on lo0
pass out quick on lo0
# outbound connections
pass out quick all keep state
# allow ping
pass in quick proto icmp all keep state
######################################################################
# Custom section for ns10.no ns
# peer pair ns10.no (A.B.C.D) <-> ns11.no (A.C.D.E)
# DNS intercommunication between ns10.no and ns11.no
pass in quick proto tcp from A.B.C.E to A.B.C.D port = 8023
######################################################################
#
# allow ssh (22/tcp)
#
pass in quick proto tcp from A.B.C.F to any port = 22 flags S keep state
keep frags
pass in quick proto tcp from A.B.C.0/23 to any port = 22 flags S keep
state keep frags
#
# allow snmp (161/udp)
#
pass in quick proto udp from A.B.C.0/23 to any port = 161
#
# allow dns (53/tcp/udp)
#
pass in quick proto tcp/udp from any to any port = 53
#
# allow https (443/tcp)
#
pass in quick proto tcp from A.B.C.0/23 to any port = 8443 flags S keep
state keep frags
#
# virus traffic we're not interested in
#
block in quick proto tcp from any to any port = 80
block in quick proto tcp from any to any port = 445
block in quick proto tcp/udp from any to any port 134 >< 140
#
# log and deny everything else
#
block in log all
block out log all
# end of file
######################################################################
Thanks in advance.
--
Erik Huizing
Regional Services
(403)-781-4906