Darren Reed wrote:
So you are seeing SYN-ACK packets blocked because they are "out of window".

This is something new.  Can you create a snoop file with these in it for me
to see ?

Also, there were are significant changes in 4.1.10 with respect to out of
window packets.

Hello,

Back to an old topic which is biting me right now:

I've got plenty of packets blocked with OOW. It seems it appeared since I upgraded from 4.1.8 to 4.1.10.

May 15 11:35:46 osiris ipmon[182]: [ID 702911 local0.notice] 11:35:45.887697 e1000g0 @0:17 b 144.204.65.4,34162 -> 144.204.16.1,3128 PR tcp len 20 48 -S IN OOW May 15 11:35:47 osiris ipmon[182]: [ID 702911 local0.notice] 11:35:47.831662 e1000g0 @0:17 b 144.204.65.4,65483 -> 144.204.16.1,3128 PR tcp len 20 512 -AFP IN OOW May 15 11:35:48 osiris ipmon[182]: [ID 702911 local0.notice] 11:35:47.931891 e1000g0 @0:17 b 144.204.65.4,65484 -> 144.204.16.1,3128 PR tcp len 20 715 -AFP IN OOW

And the rule that's blocking them is the one that should let them go, if I understand correctly:

# ipfstat -io | sed -n  '17p'
pass in quick on e1000g0 proto tcp from 144.204.65.4/31 to 144.204.16.1/32 port = 3128 flags S/FSRPAU keep state

Any idea?
Would 4.1.13 fix it? I'd rather know before chasing the latest version, I can't reboot that box too often.

Box is Solaris 9 SPARC, with some patches, pfil 2.1.7, IPF 4.1.10.

TIA,

Laurent

Reply via email to