Le Vendredi 12 Mars 2010 22:21:49, Willy Tarreau a écrit :
> On Fri, Mar 12, 2010 at 09:55:07PM +0100, Willy Tarreau wrote:
> > I've just looked at your traces. It's strange that it's related to the
> > blackhole feature because the doc says it just disables sending of
> > port unreachables (and possibly RSTs). From your traces, an RST is
> > properly sent in response to the "250", but the server happily
> > ignores despite the fact that its sequence number is OK, and it
> > keeps resending the same data over and over. And as your trace
> > shows that you sniffed on the server, there's no risk that the
> > RST was dropped on the network.
> 
> After a bit of thinking, while it is wrong from the server to have
> ignored the RST in the first place, it's wrong for the client not
> to resend it on subsequent packets, and this is what is caused by
> the BLACKHOLE patch. I've checked the patch, and I see what is
> wrong in it : it prevents sending of RST packets in any case,
> while it should only be prevented in response to a SYN. I have one
> similar patch in my own 2.4 tree which does not exhibit the issue,
> so I'll contact Brad with that.


Here is the last patch Brad provided me against the last grsec (if you want to 
check this one) : http://www.grsecurity.net/~spender/blackhole3.diff

But despites this, I always get the same problem.


Guillaume

-- 
Guillaume Castagnino
    g.castagn...@pepperway.fr
    Tel : +33148242089

Reply via email to