I think this may be an issue with Xen that is triggered when DNATting
between a physical and virtual interface.

I have not yet trigger the problem when DNATting between two virtual interfaces.

The problem is repeatable, but intermittent.

What I see are ACKs going missing.  They are disappearing in the firewall DomU.

Here are three traces:  at the webserver, at the firewall DMZ
interface and at the firewall internet (pciback physical) interface.

On the webserver and at the DMZ interface the http GET on line 4 is
immediately followed by an ACK from the webserver.

On the internet facing firewall interface this ACK is missing.

Apologies for Gmail's horrible linewrapping

========================
webserver
30.195628 78.225.169.33 -> 81.63.145.197 TCP 66 1305 → 80 [SYN] Seq=0
Win=65535 Len=0 MSS=1452 WS=2 SACK_PERM=1
30.195641 81.63.145.197 -> 78.225.169.33 TCP 66 80 → 1305 [SYN, ACK]
Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM=1 WS=128
30.243165 78.225.169.33 -> 81.63.145.197 TCP 54 1305 → 80 [ACK] Seq=1
Ack=1 Win=65536 Len=0
30.244419 78.225.169.33 -> 81.63.145.197 HTTP 479 GET
/wp-content/plugins/bbpress/templates/default/css/bbpress.css?ver=2.5.8-5815
HTTP/1.1
30.244441 81.63.145.197 -> 78.225.169.33 TCP 54 80 → 1305 [ACK] Seq=1
Ack=426 Win=30336 Len=0
30.246504 81.63.145.197 -> 78.225.169.33 HTTP 2958 HTTP/1.1 200 OK  (text/css)
30.246579 81.63.145.197 -> 78.225.169.33 TCP 2671 80 → 1305 [PSH, ACK]
Seq=2905 Ack=426 Win=30336 Len=2617
30.298839 78.225.169.33 -> 81.63.145.197 TCP 66 [TCP Dup ACK 197#1]
1305 → 80 [ACK] Seq=426 Ack=1 Win=65536 Len=0 SLE=2905 SRE=4357
30.299064 78.225.169.33 -> 81.63.145.197 TCP 66 [TCP Dup ACK 197#2]
1305 → 80 [ACK] Seq=426 Ack=1 Win=65536 Len=0 SLE=2905 SRE=5522
30.299084 81.63.145.197 -> 78.225.169.33 HTTP 1506 [TCP Fast
Retransmission] HTTP/1.1 200 OK  (text/css)

========================
firewall dmz facing
31.140504 78.225.169.33 -> 81.63.145.197 TCP 66 1305 → 80 [SYN] Seq=0
Win=65535 Len=0 MSS=1452 WS=2 SACK_PERM=1
31.140633 81.63.145.197 -> 78.225.169.33 TCP 66 80 → 1305 [SYN, ACK]
Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM=1 WS=128
31.188045 78.225.169.33 -> 81.63.145.197 TCP 54 1305 → 80 [ACK] Seq=1
Ack=1 Win=65536 Len=0
31.189287 78.225.169.33 -> 81.63.145.197 HTTP 479 GET
/wp-content/plugins/bbpress/templates/default/css/bbpress.css?ver=2.5.8-5815
HTTP/1.1
31.189468 81.63.145.197 -> 78.225.169.33 TCP 54 80 → 1305 [ACK] Seq=1
Ack=426 Win=30336 Len=0
31.191515 81.63.145.197 -> 78.225.169.33 HTTP 2958 HTTP/1.1 200 OK  (text/css)
31.191569 81.63.145.197 -> 78.225.169.33 TCP 2671 80 → 1305 [PSH, ACK]
Seq=2905 Ack=426 Win=30336 Len=2617
31.243692 78.225.169.33 -> 81.63.145.197 TCP 66 [TCP Dup ACK 203#1]
1305 → 80 [ACK] Seq=426 Ack=1 Win=65536 Len=0 SLE=2905 SRE=4357
31.243930 78.225.169.33 -> 81.63.145.197 TCP 66 [TCP Dup ACK 203#2]
1305 → 80 [ACK] Seq=426 Ack=1 Win=65536 Len=0 SLE=2905 SRE=5522
31.244086 81.63.145.197 -> 78.225.169.33 HTTP 2958 [TCP Fast
Retransmission] HTTP/1.1 200 OK  (text/css)

========================
firewall internet facing
24.872242 78.225.169.33 -> 5.145.19.28  TCP 66 1305 → 80 [SYN] Seq=0
Win=65535 Len=0 MSS=1460 WS=2 SACK_PERM=1
24.872412  5.145.19.28 -> 78.225.169.33 TCP 66 80 → 1305 [SYN, ACK]
Seq=0 Ack=1 Win=29200 Len=0 MSS=1452 SACK_PERM=1 WS=128
24.919779 78.225.169.33 -> 5.145.19.28  TCP 60 1305 → 80 [ACK] Seq=1
Ack=1 Win=65536 Len=0
24.921022 78.225.169.33 -> 5.145.19.28  HTTP 479 GET
/wp-content/plugins/bbpress/templates/default/css/bbpress.css?ver=2.5.8-5815
HTTP/1.1
24.923342  5.145.19.28 -> 78.225.169.33 TCP 1506 [TCP Previous segment
not captured] 80 → 1305 [ACK] Seq=2905 Ack=426 Win=30336 Len=1452
24.923346  5.145.19.28 -> 78.225.169.33 TCP 1219 80 → 1305 [PSH, ACK]
Seq=4357 Ack=426 Win=30336 Len=1165
24.975437 78.225.169.33 -> 5.145.19.28  TCP 66 [TCP Dup ACK 57#1] 1305
→ 80 [ACK] Seq=426 Ack=1 Win=65536 Len=0 SLE=2905 SRE=4357
24.975680 78.225.169.33 -> 5.145.19.28  TCP 66 [TCP Dup ACK 57#2] 1305
→ 80 [ACK] Seq=426 Ack=1 Win=65536 Len=0 SLE=2905 SRE=5522
24.975861  5.145.19.28 -> 78.225.169.33 HTTP 1506 [TCP Fast
Retransmission] HTTP/1.1 200 OK  (text/css)


I am thankful for any recommendations on how to proceed from here.

jCandlish

.

------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://makebettercode.com/inteldaal-eval
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to