Hi Tom,

Tom Eastep schrieb am 23.08.2019 01:55:

> On 8/21/19 12:30 PM, Timo Sigurdsson wrote:
> 
>>>> After upgrading to Debian Buster, I found a couple of log
>>>> entries which look like this: net-fw DROP IN=eth0 OUT=
>>>> MAC=[SNIP] SRC=[PUBLIC IP ADDR] DST=[IP OF $FW] LEN=44 TOS=0x00
>>>> PREC=0x00 TTL=63 ID=28969 DF PROTO=TCP SPT=41498 DPT=443 
>>>> WINDOW=29200 RES=0x00 SYN URGP=0
>>> 
>>> 
>>> Your rule is limited to 5 connections per minute *from all
>>> sources*. If you want a per-source-ip limit, you must change the
>>> rule to:
>>> 
>>> ACCEPT     net     $FW    tcp,udp 443     -      -    s:5/min
>>> 
>> 
>> You're right, I forgot about that even though that was an
>> intentional decision when I configured the rules. Nevertheless, I
>> still don't think that this is the issue here. I just checked my
>> server logs again for the times around the dropped packets. There
>> were *no* connections around these times. In the case of the log
>> entry that I've shown above, the last connection seen by the daemon
>> listening on port 443 was about 5.5 hours before the dropped packet
>> and the next one was almost 2 hours after the dropped packet
>> (obviously not a busy server ;)). The shortest timespan between a
>> connection and a dropped packet in the last two weeks was 30
>> minutes. And again, rate limiting as the cause of the issue would
>> not explain why I haven't seens such dropped packets before with
>> the same configuration.
>> 
> 
> If you switch to using the legacy backend, does the problem go away?
> 
> The packet shown above has only the SYN flag set, so the problem isn't
> an invalid combination of TCP flags.

The problem did go away. Yet, I'm not sure yet, whether that was really because 
of the switch from iptables-nft to iptables-legacy. The reason I'm saying this 
is that before I switched to iptables-legacy, I didn't see such packets anymore 
for three days. So I will give iptables-nft another try. I'm just not sure what 
could have caused this change in behavior since the only meaningful change in 
the meantime I remember was a kernel upgrade. So, I will test again with 
iptables-nft and see what happens. If I don't bring it up again on the 
mailinglist, consider this issue solved.

I did find two other issues though - I will send separate emails for those, 
however, so this thread doesn't get all too complicated with different issues.


Thanks,

Timo


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to