salutare, client oracle - linux router1 - linux router2 - linux3 - ipsec - checkpoint - server oracle
din cand in cand (nu am reusit sa determin conditia de aparitie a situatiei) clientul primeste succesiunea de erori: ORA-03113: end-of-file on communication channel; ORA-03114 not connected to oracle; Oracle has terminated the session or the connection is dropped. am pornit un ping -t catre oracle pe masina client si am asteptat sa apara eroarea; am atasat un tcpdump cu comentarii la momentul cu eroarea. 10.253.7.2 este masina client; 10.70.1.10 este masina server tcpdump-ul este rulat pe linux3 eroarea apare la toate cele 3 masini client, independent una de cealalta (in timp ce secventa de PUSH-uri se repeta la o masina, alta masina avea trafic ok), dupa un anumit timp de inactivitate banuiesc vreo setare de timeout la serverul oracle (SQLNET.EXPIRE_TIME setat in sqlnet.ora), insa inainte de a intreba partenerul vreau sa ma asigur ca in 'ograda' mea nu sunt probleme; ce nu inteleg eu din logul tcpdump este de ce dupa primul PUSH (P [tcp sum ok] 181163780:181163801(21)) o ia de la zero cu secventa tcp (P [tcp sum ok] 0:21(21) ack 1) in majoritatea cazurilor repeta secventa cu 0:21, dar am prins si un caz cand a repetat, de exemplu, cu P[tcp sum ok] 41580:41603(23) alte detalii... pe linux1 nu este nici un filtru, este doar ip_forward; pe linux2 i se face nat in ambele sensuri (masina client vine de la linux1 cu 192.168.7.2 si iese catre linux3 cu 10.253.7.2, iar traficul care vine de la linux3 catre 10.253.7.2 iese spre linux1 cu 192.168.7.2); linux2 mai are activat ip_conntrack (are un -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT) multumesc costin -- Attached file included as plaintext by Ecartis -- -- File: tcpdump cu pingul pornit.txt # ping -t in cmd pe masina cu clientul oracle 09:19:50.104640 IP (tos 0x0, ttl 126, id 17072, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 29441 09:19:50.172618 IP (tos 0x0, ttl 254, id 65159, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29441 09:19:50.172737 IP (tos 0x0, ttl 253, id 65159, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29441 # icmp reply-urile apar de doua ori pentru ca tcpdump ruleaza pe masina cu tunelul ipsec, o data cand vine reply-ul (ttl 254) si a doua oara cand iese (ttl 253), masina avand o singura interfata de retea 09:19:51.106438 IP (tos 0x0, ttl 126, id 17085, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 29697 09:19:51.187743 IP (tos 0x0, ttl 254, id 65160, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29697 09:19:51.187861 IP (tos 0x0, ttl 253, id 65160, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29697 09:19:52.109341 IP (tos 0x0, ttl 126, id 17096, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 29953 09:19:52.183778 IP (tos 0x0, ttl 254, id 65161, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29953 09:19:52.183880 IP (tos 0x0, ttl 253, id 65161, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 29953 09:19:53.110242 IP (tos 0x0, ttl 126, id 17107, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 30209 09:19:53.185074 IP (tos 0x0, ttl 254, id 65162, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30209 09:19:53.185173 IP (tos 0x0, ttl 253, id 65162, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30209 09:19:54.111152 IP (tos 0x0, ttl 126, id 17120, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 30465 09:19:54.188212 IP (tos 0x0, ttl 254, id 65163, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30465 09:19:54.188314 IP (tos 0x0, ttl 253, id 65163, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30465 # aici da click pe execute query (la netstat -na pe masina windows conexiunea apare ESTABLISHED) 09:19:54.385475 IP (tos 0x0, ttl 126, id 17124, offset 0, flags [DF], length: 61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 181163780:181163801(21) ack 1225528577 win 64220 09:19:54.986965 IP (tos 0x0, ttl 126, id 17131, offset 0, flags [DF], length: 61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 0:21(21) ack 1 win 64220 09:19:55.113066 IP (tos 0x0, ttl 126, id 17133, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 30721 09:19:55.177414 IP (tos 0x0, ttl 254, id 65164, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30721 09:19:55.177516 IP (tos 0x0, ttl 253, id 65164, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30721 09:19:56.115455 IP (tos 0x0, ttl 126, id 17145, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 30977 09:19:56.181948 IP (tos 0x0, ttl 254, id 65165, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30977 09:19:56.182069 IP (tos 0x0, ttl 253, id 65165, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 30977 09:19:56.190447 IP (tos 0x0, ttl 126, id 17147, offset 0, flags [DF], length: 61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 0:21(21) ack 1 win 64220 09:19:57.116900 IP (tos 0x0, ttl 126, id 17157, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 31233 09:19:57.180655 IP (tos 0x0, ttl 254, id 65166, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31233 09:19:57.180756 IP (tos 0x0, ttl 253, id 65166, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31233 09:19:58.118804 IP (tos 0x0, ttl 126, id 17169, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 31489 09:19:58.194209 IP (tos 0x0, ttl 254, id 65167, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31489 09:19:58.194309 IP (tos 0x0, ttl 253, id 65167, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31489 09:19:58.597457 IP (tos 0x0, ttl 126, id 17175, offset 0, flags [DF], length: 61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 0:21(21) ack 1 win 64220 09:19:59.120028 IP (tos 0x0, ttl 126, id 17181, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 31745 09:19:59.188867 IP (tos 0x0, ttl 254, id 65168, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31745 09:19:59.188977 IP (tos 0x0, ttl 253, id 65168, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 31745 09:20:00.121593 IP (tos 0x0, ttl 126, id 17193, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 32001 09:20:00.194147 IP (tos 0x0, ttl 254, id 65169, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32001 09:20:00.194253 IP (tos 0x0, ttl 253, id 65169, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32001 09:20:01.122514 IP (tos 0x0, ttl 126, id 17318, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 32257 09:20:01.192905 IP (tos 0x0, ttl 254, id 65170, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32257 09:20:01.193009 IP (tos 0x0, ttl 253, id 65170, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32257 09:20:01.416873 IP (tos 0x0, ttl 254, id 65171, offset 0, flags [none], length: 84) 10.70.1.10 > 10.253.7.1: icmp 64: echo reply seq 1 09:20:02.124749 IP (tos 0x0, ttl 126, id 17329, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 32513 09:20:02.191396 IP (tos 0x0, ttl 254, id 65172, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32513 09:20:02.191517 IP (tos 0x0, ttl 253, id 65172, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32513 09:20:03.126346 IP (tos 0x0, ttl 126, id 17340, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 32769 09:20:03.204510 IP (tos 0x0, ttl 254, id 65173, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32769 09:20:03.204616 IP (tos 0x0, ttl 253, id 65173, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 32769 09:20:03.411417 IP (tos 0x0, ttl 126, id 17343, offset 0, flags [DF], length: 61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 0:21(21) ack 1 win 64220 09:20:04.128281 IP (tos 0x0, ttl 126, id 17352, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 33025 09:20:04.193424 IP (tos 0x0, ttl 254, id 65174, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33025 09:20:04.193528 IP (tos 0x0, ttl 253, id 65174, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33025 09:20:05.134170 IP (tos 0x0, ttl 126, id 17363, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 33281 09:20:05.246722 IP (tos 0x0, ttl 254, id 65175, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33281 09:20:05.246822 IP (tos 0x0, ttl 253, id 65175, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33281 09:20:06.135086 IP (tos 0x0, ttl 126, id 17376, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 33537 09:20:06.200681 IP (tos 0x0, ttl 254, id 65176, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33537 09:20:06.200786 IP (tos 0x0, ttl 253, id 65176, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33537 09:20:07.136988 IP (tos 0x0, ttl 126, id 17387, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 33793 09:20:07.487776 IP (tos 0x0, ttl 254, id 65177, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33793 09:20:07.487877 IP (tos 0x0, ttl 253, id 65177, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 33793 09:20:08.137893 IP (tos 0x0, ttl 126, id 17398, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 34049 09:20:08.203007 IP (tos 0x0, ttl 254, id 65178, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34049 09:20:08.203116 IP (tos 0x0, ttl 253, id 65178, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34049 09:20:09.141167 IP (tos 0x0, ttl 126, id 17411, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 34305 09:20:09.206861 IP (tos 0x0, ttl 254, id 65179, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34305 09:20:09.206968 IP (tos 0x0, ttl 253, id 65179, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34305 09:20:10.143076 IP (tos 0x0, ttl 126, id 17423, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 34561 09:20:10.219406 IP (tos 0x0, ttl 254, id 65180, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34561 09:20:10.219507 IP (tos 0x0, ttl 253, id 65180, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34561 09:20:11.147640 IP (tos 0x0, ttl 126, id 17435, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 34817 09:20:11.218862 IP (tos 0x0, ttl 254, id 65181, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34817 09:20:11.218963 IP (tos 0x0, ttl 253, id 65181, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 34817 09:20:12.150558 IP (tos 0x0, ttl 126, id 17446, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 35073 09:20:12.214123 IP (tos 0x0, ttl 254, id 65182, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35073 09:20:12.214224 IP (tos 0x0, ttl 253, id 65182, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35073 09:20:13.039394 IP (tos 0x0, ttl 126, id 17456, offset 0, flags [DF], length: 61) 10.253.7.2.3632 > 10.70.1.10.1521: P [tcp sum ok] 0:21(21) ack 1 win 64220 # dupa inca 21 de secunde, la 40 de secunde de la click pe execute query, aplicatia client raporteaza eroarea ORA-03113 end-of-file on communication channel 09:20:13.151466 IP (tos 0x0, ttl 126, id 17458, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 35329 09:20:13.216215 IP (tos 0x0, ttl 254, id 65183, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35329 09:20:13.216314 IP (tos 0x0, ttl 253, id 65183, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35329 09:20:14.153378 IP (tos 0x0, ttl 126, id 17469, offset 0, flags [none], length: 60) 10.253.7.2 > 10.70.1.10: icmp 40: echo request seq 35585 09:20:14.219746 IP (tos 0x0, ttl 254, id 65184, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35585 09:20:14.219847 IP (tos 0x0, ttl 253, id 65184, offset 0, flags [none], length: 60) 10.70.1.10 > 10.253.7.2: icmp 40: echo reply seq 35585 --- Detalii despre listele noastre de mail: http://www.lug.ro/
