Darren Reed wrote:
> Can you identify where these packets go?
All those I'm interested in are coming from the same machine: they are
cascaded proxies. The one I'm having trouble with is the outside proxy.
The inside proxy is the one from which all connections come, a few of
those are blocked.
However, the same problem happen with many other web sites.
> pfil stats show anything?
Where do I find those on Solaris? kstat doesn't show anything?
It's loaded, that's for sure:
# ifconfig e1000g0 modlist
0 arp
1 ip
2 pfil
3 e1000g
> ipfstat?
Nothing obvious to me:
# ipfstat
bad packets: in 0 out 0
IPv6 packets: in 0 out 0
input packets: blocked 5108 passed 3627735 nomatch 165 counted
0 short 0
output packets: blocked 7533 passed 3512062 nomatch 2196 counted
0 short 0
input packets logged: blocked 5108 passed 30
output packets logged: blocked 7526 passed 0
packets logged: input 0 output 0
log failures: input 21 output 4
fragment state(in): kept 0 lost 0 not fragmented 0
fragment state(out): kept 0 lost 0 not fragmented 0
packet state(in): kept 121296 lost 240
packet state(out): kept 71694 lost 201
ICMP replies: 0 TCP RSTs sent: 0
Invalid source(in): 0
Result cache hits(in): 121481 (out): 116016
IN Pullups succeeded: 255 failed: 0
OUT Pullups succeeded: 2 failed: 0
Fastroute successes: 0 failures: 0
TCP cksum fails(in): 0 (out): 0
IPF Ticks: 7348
Packet log flags set: (0)
none
# ipfstat -s
IP states added:
184708 TCP
9650 UDP
0 ICMP
6223439 hits
1037384 misses
311 maximum
0 no memory
1021 bkts in use
1190 active
9582 expired
183586 closed
State logging enabled
State table bucket statistics:
1021 in use
17.80% bucket usage
0 minimal length
4 maximal length
1.166 average length
> netstat?
Since it's a proxy, a few thousands of TIME_WAIT, all from the same
originating IP.
# netstat -an | grep 3128 | grep -v TIME_WAIT | wc -l
94
# netstat -an | grep 3128 | grep TIME_WAIT | wc -l
3187
The packets blocked are incoming (SYN on an authorized port w/ a "flags
S keep state" rule), or outgoing, on a the same rule, so the state
should allow the outgoing packet.
Only a small percentage of those packets are blocked, though, just
enough to get time-out on Internet access and annoy users. They're all
coming from the same box, and allowed by the same rule, so why only a few?
Laurent