Laurent Blume wrote:
It's not reproduceable per se, but it happens all the time. I'm going to
get a snoop on both sides this afternoon, and send that direct to you.
Thanks Darren!
Hmmm, actually, it's now also blocking packets without the OOW flag:
May 15 14:34:39 osiris ipmon[182]: [ID 702911 local0.notice]
14:34:39.042517 e1000g0 @0:17 b 144.204.65.4,44422 -> 144.204.16.1,3128
PR tcp len 20 48 -S IN
I don't get it?
Oh, note that not *all* those connections are blocked, only a fraction.
Since this is a proxy, there's a lot of traffic getting in, and most of
it is working. Sometimes, though, the users get a "Connection refused";
and a retry is enough.
Also, the calling party is also blocking packets (IPF 3.4.33 there):
May 15 14:37:22 onera ipmon[25422]: [ID 702911 local0.notice]
14:37:22.328907 ce0 @200:4 b 144.204.16.1,3128 -> 144.204.65.4,51954 PR
tcp len 20 1500 -AP IN
But the rule blocking them is really a block, and my guess is that the
'keep state' does not work properly because the re are packets already
dropped on the other side.
Hmmm, am I clear there? I'm kinda lost myself with those drops, I've
read and re-read again the rules, they look ok to me. And they work --
most of the time.
Laurent