Simplest way is using netstat -a from "DOS prompt".
Client socket ports, IIRC, run from 32768 thru to 65535, hopping up 2 for each 
new connection.
(So there might only be 16k not 64k ports available. And TCP stack might have 
other internal limits)
Netstat will show ports that have just been used, closed and not reusable yet - 
in a TIME_WAIT or CLOSE_WAIT state.
There might be a programmer API for this, but the default search result still 
seems to be netstat.

Is it not possible to merge multiple connections into one longer lasting one 
and see if this resolves the issue?

Another thought is "DoS" - denial of service. After reading up a bit, seems a 
lot more involved there than I first thought.  But you could be triggering one 
of the TCP/IP vulnerabilities, not sure exactly which one, most likely 
something similar to sockstress.

Stephen Dickason
Senior Developer - Managed Services
  Email: sdicka...@elcb.co.za

ELCB Information Services (Pty) Ltd
Customer Service Email  e...@elcb.co.za * www.elcb.co.za
E A S T  L O N D O N
Tel: +27(43)  704 0700
Fax: +27(43) 704 0701
J O H A N N E S B U R G
Tel: +27(11) 879 6179
Fax: +27(11) 454 0384
P O R T  E L I Z A B E T H
Tel: +27(41) 373 0529
Fax: +27(86) 650 0135
Disclaimer


-----Original Message-----
From: TWSocket [mailto:twsocket-boun...@lists.elists.org] On Behalf Of Doug 
Billi
Sent: 13 August 2014 09:27 PM
To: ICS support mailing
Subject: Re: [twsocket] Handle Leak

I keep stats on the number of concurrent connections open in both the client 
and server, but I never see them build up -- they are processed as fast as they 
are sent. In our application, where this first occurred, we were using LoadUI 
to send 1 connection per second.

Is there a way to monitor the number of available ports?

Thanks,
Doug

-----Original Message-----
From: Stephen Dickason [mailto:sdicka...@elcb.co.za]
Sent: Tuesday, August 12, 2014 11:23 PM
To: ICS support mailing
Subject: Re: [twsocket] Handle Leak

I could be wrong and haven't time to scan your code.
But there is an error condition that will arise if all the client ports are 
used (and to be tautologous) no more are available; 64k ports is a lot so 
hardly happens.
It would most likely happen in the conditions you describe -
        none for period of time
        sudden increase in errors (depending on resilience of code).
If I'm reading your usage of ports correctly - 40 connections a second - and 
the necessary wait time after port close - you possibly hitting it.

Stephen Dickason
Senior Developer - Managed Services
  Email: sdicka...@elcb.co.za

ELCB Information Services (Pty) Ltd
Customer Service Email  e...@elcb.co.za * www.elcb.co.za E A S T  L O N D O N
Tel: +27(43)  704 0700
Fax: +27(43) 704 0701
J O H A N N E S B U R G
Tel: +27(11) 879 6179
Fax: +27(11) 454 0384
P O R T  E L I Z A B E T H
Tel: +27(41) 373 0529
Fax: +27(86) 650 0135
Disclaimer


-----Original Message-----
From: TWSocket [mailto:twsocket-boun...@lists.elists.org] On Behalf Of RTT
Sent: 12 August 2014 07:43 PM
To: ICS support mailing
Subject: Re: [twsocket] Handle Leak

On 12-08-2014 16:33, Doug Billi wrote:
> There are no memory leaks, and no other handle leaks, other than 
> security-context tokens.

Testing here and I'm not seeing any token type handle listed in the process 
explorer list of open handles for the server or client application.
The total number of handles is also stable for client and server.
Using your suggested 40 connections per second, and also XE2



--
To unsubscribe or change your settings for TWSocket mailing list please goto 
http://lists.elists.org/cgi-bin/mailman/listinfo/twsocket
Visit our website at http://www.overbyte.be

--
To unsubscribe or change your settings for TWSocket mailing list please goto 
http://lists.elists.org/cgi-bin/mailman/listinfo/twsocket
Visit our website at http://www.overbyte.be
-- 
To unsubscribe or change your settings for TWSocket mailing list
please goto http://lists.elists.org/cgi-bin/mailman/listinfo/twsocket
Visit our website at http://www.overbyte.be

Reply via email to