Dear openvswitch team, my name is Florian and I am working on research project regarding network security. We use an OpenStack-based testing environment to record Netflow-data of virtual machines. The environment delivers the netflow-data via ovs-vsctl 2.0.2.
Our problem is the following: If we establish e.g. ssh or ftp-connections between two hosts within the virtual network, we only get SYN-Flags in about 1 of athousand records. Simultaneous capturing with wireshark on the hosts show that the tcp-connections get established as expected. If we perform SYN-Flood-attacks, the SYN-Flags can be found in the data. AFAIK the flags of the whole conversation get OR-d y we expect to see the SYN-Flag in every newly established connection. So am I wrong at some point? Or can someone give me a hint where the flags might get lost? I would be pleased if someone could help me. Thanks a lot Regards Florian
0x6A6269AC.asc
Description: application/pgp-keys
<<attachment: florian_otto.vcf>>
signature.asc
Description: OpenPGP digital signature
_______________________________________________ discuss mailing list [email protected] http://openvswitch.org/mailman/listinfo/discuss
