Re: Extra files in DESTDIR with MKRUMP=no

2015-02-04 Thread Ian D. Leroux
On Thu, 29 Jan 2015 10:39:42 + (GMT) Robert Swindells
 wrote:
> idler...@fastmail.fm wrote:
> I also build with MKRUMP=no but have the following extra patch in my
> local tree:
> 
> Robert Swindells
> 
> Index: tests/mi
> ===
> RCS file: /cvsroot/src/distrib/sets/lists/tests/mi,v
> retrieving revision 1.610
> diff -u -r1.610 mi
> --- tests/mi14 Jan 2015 22:25:05 -  1.610
> +++ tests/mi29 Jan 2015 10:41:34 -
> @@ -3146,7 +3146,7 @@
>  ./usr/tests/net/in_cksum/t_in_cksumtests-net-tests atf
>  ./usr/tests/net/in_cksum/in_cksum  tests-net-tests atf
>  ./usr/tests/net/mcast  tests-net-tests
> -./usr/tests/net/mcast/Atffile  tests-net-tests 
> atf,rump
> +./usr/tests/net/mcast/Atffile  tests-net-tests atf
>  ./usr/tests/net/mcast/Kyuafile tests-net-tests 
> atf,rump,kyua
>  ./usr/tests/net/mcast/t_mcast  tests-net-tests atf
>  ./usr/tests/net/mpls   tests-net-tests

I've now convinced myself that this is the correct (and not just the
immediately convenient) fix.  The t_mcast test has no dependence on
rump that I can see,  src/tests/net/Makefile clearly builds it even
when MKRUMP=no (thus generating the corresponding Atffile), so the
presence of the Atffile is not dependent on rump either.  If you (Mr
Swindells) are not intending to do so yourself, I'll file a PR
(crediting you for the patch of course) so that this doesn't get
forgotten about in the list archives.

--
IDL


daily CVS update output

2015-02-04 Thread NetBSD source update

Updating src tree:
U src/crypto/external/bsd/netpgp/dist/src/netpgpverify/1keypubring.gpg
U src/crypto/external/bsd/netpgp/dist/src/netpgpverify/1keysecring.gpg
U src/crypto/external/bsd/netpgp/dist/src/netpgpverify/1keytest.gpg.uu
P src/crypto/external/bsd/netpgp/dist/src/netpgpverify/Makefile.bsd
P src/crypto/external/bsd/netpgp/dist/src/netpgpverify/bzlib.c
P src/crypto/external/bsd/netpgp/dist/src/netpgpverify/bzlib_private.h
P src/crypto/external/bsd/netpgp/dist/src/netpgpverify/chk.sh
U src/crypto/external/bsd/netpgp/dist/src/netpgpverify/digest-20121220.tgz
U src/crypto/external/bsd/netpgp/dist/src/netpgpverify/joyent-pubring.gpg
P src/crypto/external/bsd/netpgp/dist/src/netpgpverify/libnetpgpverify.3
P src/crypto/external/bsd/netpgp/dist/src/netpgpverify/libverify.c
U src/crypto/external/bsd/netpgp/dist/src/netpgpverify/mkdist
U src/crypto/external/bsd/netpgp/dist/src/netpgpverify/testit.sh
P src/crypto/external/bsd/netpgp/dist/src/netpgpverify/verify.h
P src/crypto/external/bsd/netpgp/dist/src/netpgpverify/zlib.c
P src/external/mit/lua/dist/src/luaconf.h
P src/lib/librumpuser/rumpuser_sp.c
P src/sys/dev/pci/ixgbe/ixgbe.c
P src/sys/dev/pci/ixgbe/ixgbe.h
P src/sys/dev/pci/ixgbe/ixgbe_netbsd.c
P src/sys/dev/usb/usbdevs
P src/sys/dev/usb/usbdevs.h
P src/sys/dev/usb/usbdevs_data.h
P src/sys/kern/subr_prf.c
P src/sys/kern/vfs_vnops.c
P src/sys/rump/librump/rumpkern/Makefile.rumpkern

Updating xsrc tree:


Killing core files:

Running the SUP scanner:
SUP Scan for current starting at Thu Feb  5 03:04:55 2015
SUP Scan for current completed at Thu Feb  5 03:06:11 2015
SUP Scan for mirror starting at Thu Feb  5 03:06:11 2015
SUP Scan for mirror completed at Thu Feb  5 03:08:33 2015




Updating file list:
-rw-rw-r--  1 srcmastr  netbsd  48856724 Feb  5 03:20 ls-lRA.gz


Re: DoS attack against TCP services

2015-02-04 Thread 6bone

dmesg reports in loger intervals:

nd6_storelladdr: something odd happens

I do not know if this is the cause for the TIME_WAIT connections or a 
consequence of TIME_WAIT connections.



Regards
Uwe


On Wed, 4 Feb 2015, Martin Husemann wrote:


Date: Wed, 4 Feb 2015 23:37:05 +0100
From: Martin Husemann 
To: Christos Zoulas 
Cc: 6b...@6bone.informatik.uni-leipzig.de, current-users@netbsd.org
Subject: Re: DoS attack against TCP services

On Wed, Feb 04, 2015 at 05:33:10PM -0500, Christos Zoulas wrote:

Something timer related? Are there any clock events?


One of the cores dead/lievlocked in softnet?

Martin



Re: DoS attack against TCP services

2015-02-04 Thread Michael van Elst
6b...@6bone.informatik.uni-leipzig.de writes:

>the process is the named (version: bind-9.10.1pl1). The outgoing 
>connections are normal. stopping the named do not remove the TIME_WAIT 
>connections.

The TIME_WAIT entries aren't connected to a process anymore. That's
normal behaviour.

-- 
-- 
Michael van Elst
Internet: mlel...@serpens.de
"A potential Snark may lurk in every tree."


Re: DoS attack against TCP services

2015-02-04 Thread Martin Husemann
On Wed, Feb 04, 2015 at 05:33:10PM -0500, Christos Zoulas wrote:
> Something timer related? Are there any clock events?

One of the cores dead/lievlocked in softnet?

Martin


Re: DoS attack against TCP services

2015-02-04 Thread Christos Zoulas
On Feb 4, 11:27pm, 6b...@6bone.informatik.uni-leipzig.de 
(6b...@6bone.informatik.uni-leipzig.de) wrote:
-- Subject: Re: DoS attack against TCP services

| Hello,
| 
| I'm afraid I have chosen the wrong subject. After some testing, I found 
| that all tcp connections go in the TIME_WAIT state. This applies to 
| inbound connections and outbound connections. To me it looked like an 
| attack. But now I think it is a kernel error.
| 
| After restarting the server a few weeks is stable. Any event brings the 
| server then to leave all tcp connections in the TIME_WAIT state.

Something timer related? Are there any clock events?

christos


Re: DoS attack against TCP services

2015-02-04 Thread 6bone

Hello,

I'm afraid I have chosen the wrong subject. After some testing, I found 
that all tcp connections go in the TIME_WAIT state. This applies to 
inbound connections and outbound connections. To me it looked like an 
attack. But now I think it is a kernel error.


After restarting the server a few weeks is stable. Any event brings the 
server then to leave all tcp connections in the TIME_WAIT state.



Regards
Uwe


Re: DoS attack against TCP services

2015-02-04 Thread 6bone

Hello,

the process is the named (version: bind-9.10.1pl1). The outgoing 
connections are normal. stopping the named do not remove the TIME_WAIT 
connections.


there existist also other TIME_WAIT connections (maybe from ssh probes)

tcp0  0  139.18.25.33.22115.239.228.35.38653   TIME_WAIT

Killing the sshd does not remove the connections.


Regards
Uwe


On Wed, 4 Feb 2015, Brian Buhrow wrote:


Date: Wed, 4 Feb 2015 12:02:33 -0800
From: Brian Buhrow 
To: Christos Zoulas ,
6b...@6bone.informatik.uni-leipzig.de
Cc: current-users@NetBSD.org, buh...@nfbcal.org
Subject: Re: DoS attack against TCP services

Hello.  The output from the sample netstat indicates that some process
on the machine from which this output was taken is opening up  a bunch of
connections to remote sites on port 53.  I think it would be interesting to
know if all of these connections are generated from the same process or
not.  I'm pretty sure you can get this behavior if a process fails to
close(2) a file descriptor after the connection has terminated.  I wonder
if there's some rogue process running on this machine that's been badly
coded to give itself away by engaging in this bad behavior.  Knowing
nothing else, I'd be concerned about a potential security  breech on this
machine.
-thanks
-Brian



Re: DoS attack against TCP services

2015-02-04 Thread Brian Buhrow
Hello.  The output from the sample netstat indicates that some process
on the machine from which this output was taken is opening up  a bunch of
connections to remote sites on port 53.  I think it would be interesting to
know if all of these connections are generated from the same process or
not.  I'm pretty sure you can get this behavior if a process fails to
close(2) a file descriptor after the connection has terminated.  I wonder
if there's some rogue process running on this machine that's been badly
coded to give itself away by engaging in this bad behavior.  Knowing
nothing else, I'd be concerned about a potential security  breech on this
machine.
-thanks
-Brian



Re: DoS attack against TCP services

2015-02-04 Thread Brian Buhrow
hello.  I'd suggest capturing the output of netstat -An.  The first
column of that output should be the address of the socket associated with
each of the connections.  For each connection in time_wait state, you
should be able to perform an fstat |grep for the address in column 1 of the
netstat -An output.  This should tell you which process  or processes all
of these connections are tied to.
For example:

%netstat -An 
Active Internet connections
PCB  Proto Recv-Q Send-Q Local Address Foreign Address   State
c6b9602c tcp0  0 x.x.230.11.993 x.x.59.250.23892  ESTABL

%fstat |grep c6b9602c
buhrow imapd  268580* internet stream tcp c6b9602c x.x.230.11:993 <-> 
x.x.59.250:23892
buhrow imapd  268581* internet stream tcp c6b9602c x.x.230.11:993 <-> 
x.x.59.250:23892


The bug could be as simple as the daemon that's responsible for these
connections failing to close the sockets once the connections terminate.
-thanks
-Brian

On Feb 4,  7:44pm, 6b...@6bone.informatik.uni-leipzig.de wrote:
} Subject: Re: DoS attack against TCP services
} Now the server has over 5000 TIME_WAIT connections.
} 
} netstat -a -n | grep TIME_WAIT
} tcp0  0  139.18.25.33.59256 198.6.1.83.53  TIME_WAIT
} tcp0  0  139.18.25.33.59257 77.222.50.250.53   TIME_WAIT
} tcp0  0  139.18.25.33.59258 193.232.128.6.53   TIME_WAIT
} tcp0  0  139.18.25.33.59259 78.104.145.37.53   TIME_WAIT
} tcp0  0  139.18.25.33.59260 192.5.6.30.53  TIME_WAIT
} tcp0  0  139.18.25.33.59261 192.41.162.30.53   TIME_WAIT
} tcp0  0  139.18.25.33.59262 192.35.51.30.53TIME_WAIT
} tcp0  0  139.18.25.33.59263 192.43.172.30.53   TIME_WAIT
} tcp0  0  139.18.25.33.59264 202.12.27.33.53TIME_WAIT
} ...
} 
} It seems to be a result of the named. lsof shows that the connections are 
} not owned by named. lsof doesn't show any of the TIME_WAIT connections. So 
} stopping and restarting named doesn't delete the connections.
} 
} Any more things that could be interessing for a problem report?
} 
} 
} Regards
} Uwe
} 
} 
} On Wed, 4 
} Feb 
} 2015, Christos Zoulas wrote:
} 
} > Date: Wed, 4 Feb 2015 15:40:00 + (UTC)
} > From: Christos Zoulas 
} > To: current-users@netbsd.org
} > Subject: Re: DoS attack against TCP services
} > 
} > In article 
,
} > <6b...@6bone.informatik.uni-leipzig.de> wrote:
} >> Hello,
} >>
} >> The problem occurred again. The kernel has over 3,000 connections in
} >> TIME_WAIT state. The compounds are after an hour wait not disappeared.
} >> There are more and more connections in the TIME_WAIT state. My settings
} >> are:
} >>
} >> net.inet.tcp.mslt.enable = 1
} >> net.inet.tcp.mslt.loopback = 2
} >> net.inet.tcp.mslt.local = 10
} >> net.inet.tcp.mslt.remote = 60
} >> net.inet.tcp.mslt.remote_threshold = 6
} >>
} >> The last few times I have restarted the server in order to solve the
} >> problem. Frequent reboots but very inconvenient for a server.
} >>
} >> Does anyone have instructions what information I can still gather to post
} >> a bug report? The statement "connections in the TIME_WAIT status are not
} >> degraded" are probably not sufficient to find the problem.
} >>
} >>
} >> Thank you for your efforts
} >
} > Can you find what daemon/process is being connected to and from where?
} >
} > christos
} >
>-- End of excerpt from 6b...@6bone.informatik.uni-leipzig.de




Re: DoS attack against TCP services

2015-02-04 Thread 6bone

I picked out one connection:

fe8678e73990 tcp0  0 139.18.25.33.58935199.254.60.1.53 
TMWAIT


But 'fstat -n | grep 73990' shows no result. lsof also shows no socket for 
this connection.



Regards
Uwe


On Wed, 4 Feb 2015, Brian Buhrow wrote:


Date: Wed, 4 Feb 2015 11:49:16 -0800
From: Brian Buhrow 
To: 6b...@6bone.informatik.uni-leipzig.de,
Christos Zoulas 
Cc: current-users@NetBSD.org, buh...@nfbcal.org
Subject: Re: DoS attack against TCP services

hello.  I'd suggest capturing the output of netstat -An.  The first
column of that output should be the address of the socket associated with
each of the connections.  For each connection in time_wait state, you
should be able to perform an fstat |grep for the address in column 1 of the
netstat -An output.  This should tell you which process  or processes all
of these connections are tied to.
For example:

%netstat -An
Active Internet connections
PCB  Proto Recv-Q Send-Q Local Address Foreign Address   State
c6b9602c tcp0  0 x.x.230.11.993 x.x.59.250.23892  ESTABL

%fstat |grep c6b9602c
buhrow imapd  268580* internet stream tcp c6b9602c x.x.230.11:993 <-> 
x.x.59.250:23892
buhrow imapd  268581* internet stream tcp c6b9602c x.x.230.11:993 <-> 
x.x.59.250:23892


The bug could be as simple as the daemon that's responsible for these
connections failing to close the sockets once the connections terminate.
-thanks
-Brian

On Feb 4,  7:44pm, 6b...@6bone.informatik.uni-leipzig.de wrote:
} Subject: Re: DoS attack against TCP services
} Now the server has over 5000 TIME_WAIT connections.
}
} netstat -a -n | grep TIME_WAIT
} tcp0  0  139.18.25.33.59256 198.6.1.83.53  TIME_WAIT
} tcp0  0  139.18.25.33.59257 77.222.50.250.53   TIME_WAIT
} tcp0  0  139.18.25.33.59258 193.232.128.6.53   TIME_WAIT
} tcp0  0  139.18.25.33.59259 78.104.145.37.53   TIME_WAIT
} tcp0  0  139.18.25.33.59260 192.5.6.30.53  TIME_WAIT
} tcp0  0  139.18.25.33.59261 192.41.162.30.53   TIME_WAIT
} tcp0  0  139.18.25.33.59262 192.35.51.30.53TIME_WAIT
} tcp0  0  139.18.25.33.59263 192.43.172.30.53   TIME_WAIT
} tcp0  0  139.18.25.33.59264 202.12.27.33.53TIME_WAIT
} ...
}
} It seems to be a result of the named. lsof shows that the connections are
} not owned by named. lsof doesn't show any of the TIME_WAIT connections. So
} stopping and restarting named doesn't delete the connections.
}
} Any more things that could be interessing for a problem report?
}
}
} Regards
} Uwe
}
}
} On Wed, 4
} Feb
} 2015, Christos Zoulas wrote:
}
} > Date: Wed, 4 Feb 2015 15:40:00 + (UTC)
} > From: Christos Zoulas 
} > To: current-users@netbsd.org
} > Subject: Re: DoS attack against TCP services
} >
} > In article 
,
} > <6b...@6bone.informatik.uni-leipzig.de> wrote:
} >> Hello,
} >>
} >> The problem occurred again. The kernel has over 3,000 connections in
} >> TIME_WAIT state. The compounds are after an hour wait not disappeared.
} >> There are more and more connections in the TIME_WAIT state. My settings
} >> are:
} >>
} >> net.inet.tcp.mslt.enable = 1
} >> net.inet.tcp.mslt.loopback = 2
} >> net.inet.tcp.mslt.local = 10
} >> net.inet.tcp.mslt.remote = 60
} >> net.inet.tcp.mslt.remote_threshold = 6
} >>
} >> The last few times I have restarted the server in order to solve the
} >> problem. Frequent reboots but very inconvenient for a server.
} >>
} >> Does anyone have instructions what information I can still gather to post
} >> a bug report? The statement "connections in the TIME_WAIT status are not
} >> degraded" are probably not sufficient to find the problem.
} >>
} >>
} >> Thank you for your efforts
} >
} > Can you find what daemon/process is being connected to and from where?
} >
} > christos
} >

-- End of excerpt from 6b...@6bone.informatik.uni-leipzig.de





Re: DoS attack against TCP services

2015-02-04 Thread Christos Zoulas
On Feb 4,  7:44pm, 6b...@6bone.informatik.uni-leipzig.de 
(6b...@6bone.informatik.uni-leipzig.de) wrote:
-- Subject: Re: DoS attack against TCP services

| Now the server has over 5000 TIME_WAIT connections.
| 
| netstat -a -n | grep TIME_WAIT
| tcp0  0  139.18.25.33.59256 198.6.1.83.53  TIME_WAIT
| tcp0  0  139.18.25.33.59257 77.222.50.250.53   TIME_WAIT
| tcp0  0  139.18.25.33.59258 193.232.128.6.53   TIME_WAIT
| tcp0  0  139.18.25.33.59259 78.104.145.37.53   TIME_WAIT
| tcp0  0  139.18.25.33.59260 192.5.6.30.53  TIME_WAIT
| tcp0  0  139.18.25.33.59261 192.41.162.30.53   TIME_WAIT
| tcp0  0  139.18.25.33.59262 192.35.51.30.53TIME_WAIT
| tcp0  0  139.18.25.33.59263 192.43.172.30.53   TIME_WAIT
| tcp0  0  139.18.25.33.59264 202.12.27.33.53TIME_WAIT
| ...
| 
| It seems to be a result of the named. lsof shows that the connections are 
| not owned by named. lsof doesn't show any of the TIME_WAIT connections. So 
| stopping and restarting named doesn't delete the connections.
| 
| Any more things that could be interessing for a problem report?

I'd start a tcpdump to record all traffic from your local machine going to port
53 on the appropriate interface...

I'd also look at the open descriptors of the named process (although they
should be closed at this time, since TIME_WAIT means closed on this side,
and waiting for the 4 minutes to expire before killing the connection)...

Also I'd record that information every minute or so to see how many
connections are added and how many are going away.

Perhaps there is some bug triggered in the tcp stack and somehow connections
are not being GC'ed?

christos


Re: DoS attack against TCP services

2015-02-04 Thread 6bone
Yes, I am sure that the most TIME_WAIT connections stay forever. I cannot 
say for sure that no TIME_WAIT connection is removed. But I can say, that 
some example connections have been existing for more than 5 hours.



Regards
Uwe



On Wed, 4 Feb 2015, Johnny Billquist wrote:


Date: Wed, 04 Feb 2015 19:54:59 +0100
From: Johnny Billquist 
To: 6b...@6bone.informatik.uni-leipzig.de,
Christos Zoulas 
Cc: current-users@netbsd.org
Subject: Re: DoS attack against TCP services

Are you *sure* the same connections stay around forever, or might it just be 
that you get new ones at a higher rate than old ones go away?


Johnny

On 2015-02-04 19:44, 6b...@6bone.informatik.uni-leipzig.de wrote:

Now the server has over 5000 TIME_WAIT connections.

netstat -a -n | grep TIME_WAIT
tcp0  0  139.18.25.33.59256 198.6.1.83.53
TIME_WAIT
tcp0  0  139.18.25.33.59257 77.222.50.250.53
TIME_WAIT
tcp0  0  139.18.25.33.59258 193.232.128.6.53
TIME_WAIT
tcp0  0  139.18.25.33.59259 78.104.145.37.53
TIME_WAIT
tcp0  0  139.18.25.33.59260 192.5.6.30.53
TIME_WAIT
tcp0  0  139.18.25.33.59261 192.41.162.30.53
TIME_WAIT
tcp0  0  139.18.25.33.59262 192.35.51.30.53
TIME_WAIT
tcp0  0  139.18.25.33.59263 192.43.172.30.53
TIME_WAIT
tcp0  0  139.18.25.33.59264 202.12.27.33.53
TIME_WAIT
...

It seems to be a result of the named. lsof shows that the connections
are not owned by named. lsof doesn't show any of the TIME_WAIT
connections. So stopping and restarting named doesn't delete the
connections.

Any more things that could be interessing for a problem report?


Regards
Uwe


On Wed, 4 Feb 2015, Christos Zoulas wrote:


Date: Wed, 4 Feb 2015 15:40:00 + (UTC)
From: Christos Zoulas 
To: current-users@netbsd.org
Subject: Re: DoS attack against TCP services

In article
,
<6b...@6bone.informatik.uni-leipzig.de> wrote:

Hello,

The problem occurred again. The kernel has over 3,000 connections in
TIME_WAIT state. The compounds are after an hour wait not disappeared.
There are more and more connections in the TIME_WAIT state. My settings
are:

net.inet.tcp.mslt.enable = 1
net.inet.tcp.mslt.loopback = 2
net.inet.tcp.mslt.local = 10
net.inet.tcp.mslt.remote = 60
net.inet.tcp.mslt.remote_threshold = 6

The last few times I have restarted the server in order to solve the
problem. Frequent reboots but very inconvenient for a server.

Does anyone have instructions what information I can still gather to
post
a bug report? The statement "connections in the TIME_WAIT status are not
degraded" are probably not sufficient to find the problem.


Thank you for your efforts


Can you find what daemon/process is being connected to and from where?

christos





Re: DoS attack against TCP services

2015-02-04 Thread Johnny Billquist
Are you *sure* the same connections stay around forever, or might it 
just be that you get new ones at a higher rate than old ones go away?


Johnny

On 2015-02-04 19:44, 6b...@6bone.informatik.uni-leipzig.de wrote:

Now the server has over 5000 TIME_WAIT connections.

netstat -a -n | grep TIME_WAIT
tcp0  0  139.18.25.33.59256 198.6.1.83.53
TIME_WAIT
tcp0  0  139.18.25.33.59257 77.222.50.250.53
TIME_WAIT
tcp0  0  139.18.25.33.59258 193.232.128.6.53
TIME_WAIT
tcp0  0  139.18.25.33.59259 78.104.145.37.53
TIME_WAIT
tcp0  0  139.18.25.33.59260 192.5.6.30.53
TIME_WAIT
tcp0  0  139.18.25.33.59261 192.41.162.30.53
TIME_WAIT
tcp0  0  139.18.25.33.59262 192.35.51.30.53
TIME_WAIT
tcp0  0  139.18.25.33.59263 192.43.172.30.53
TIME_WAIT
tcp0  0  139.18.25.33.59264 202.12.27.33.53
TIME_WAIT
...

It seems to be a result of the named. lsof shows that the connections
are not owned by named. lsof doesn't show any of the TIME_WAIT
connections. So stopping and restarting named doesn't delete the
connections.

Any more things that could be interessing for a problem report?


Regards
Uwe


On Wed, 4 Feb 2015, Christos Zoulas wrote:


Date: Wed, 4 Feb 2015 15:40:00 + (UTC)
From: Christos Zoulas 
To: current-users@netbsd.org
Subject: Re: DoS attack against TCP services

In article
,
<6b...@6bone.informatik.uni-leipzig.de> wrote:

Hello,

The problem occurred again. The kernel has over 3,000 connections in
TIME_WAIT state. The compounds are after an hour wait not disappeared.
There are more and more connections in the TIME_WAIT state. My settings
are:

net.inet.tcp.mslt.enable = 1
net.inet.tcp.mslt.loopback = 2
net.inet.tcp.mslt.local = 10
net.inet.tcp.mslt.remote = 60
net.inet.tcp.mslt.remote_threshold = 6

The last few times I have restarted the server in order to solve the
problem. Frequent reboots but very inconvenient for a server.

Does anyone have instructions what information I can still gather to
post
a bug report? The statement "connections in the TIME_WAIT status are not
degraded" are probably not sufficient to find the problem.


Thank you for your efforts


Can you find what daemon/process is being connected to and from where?

christos





Re: DoS attack against TCP services

2015-02-04 Thread 6bone

Now the server has over 5000 TIME_WAIT connections.

netstat -a -n | grep TIME_WAIT
tcp0  0  139.18.25.33.59256 198.6.1.83.53  TIME_WAIT
tcp0  0  139.18.25.33.59257 77.222.50.250.53   TIME_WAIT
tcp0  0  139.18.25.33.59258 193.232.128.6.53   TIME_WAIT
tcp0  0  139.18.25.33.59259 78.104.145.37.53   TIME_WAIT
tcp0  0  139.18.25.33.59260 192.5.6.30.53  TIME_WAIT
tcp0  0  139.18.25.33.59261 192.41.162.30.53   TIME_WAIT
tcp0  0  139.18.25.33.59262 192.35.51.30.53TIME_WAIT
tcp0  0  139.18.25.33.59263 192.43.172.30.53   TIME_WAIT
tcp0  0  139.18.25.33.59264 202.12.27.33.53TIME_WAIT
...

It seems to be a result of the named. lsof shows that the connections are 
not owned by named. lsof doesn't show any of the TIME_WAIT connections. So 
stopping and restarting named doesn't delete the connections.


Any more things that could be interessing for a problem report?


Regards
Uwe


On Wed, 4 
Feb 
2015, Christos Zoulas wrote:



Date: Wed, 4 Feb 2015 15:40:00 + (UTC)
From: Christos Zoulas 
To: current-users@netbsd.org
Subject: Re: DoS attack against TCP services

In article ,
<6b...@6bone.informatik.uni-leipzig.de> wrote:

Hello,

The problem occurred again. The kernel has over 3,000 connections in
TIME_WAIT state. The compounds are after an hour wait not disappeared.
There are more and more connections in the TIME_WAIT state. My settings
are:

net.inet.tcp.mslt.enable = 1
net.inet.tcp.mslt.loopback = 2
net.inet.tcp.mslt.local = 10
net.inet.tcp.mslt.remote = 60
net.inet.tcp.mslt.remote_threshold = 6

The last few times I have restarted the server in order to solve the
problem. Frequent reboots but very inconvenient for a server.

Does anyone have instructions what information I can still gather to post
a bug report? The statement "connections in the TIME_WAIT status are not
degraded" are probably not sufficient to find the problem.


Thank you for your efforts


Can you find what daemon/process is being connected to and from where?

christos



Re: DoS attack against TCP services

2015-02-04 Thread Christos Zoulas
In article ,
 <6b...@6bone.informatik.uni-leipzig.de> wrote:
>Hello,
>
>The problem occurred again. The kernel has over 3,000 connections in 
>TIME_WAIT state. The compounds are after an hour wait not disappeared. 
>There are more and more connections in the TIME_WAIT state. My settings 
>are:
>
>net.inet.tcp.mslt.enable = 1
>net.inet.tcp.mslt.loopback = 2
>net.inet.tcp.mslt.local = 10
>net.inet.tcp.mslt.remote = 60
>net.inet.tcp.mslt.remote_threshold = 6
>
>The last few times I have restarted the server in order to solve the 
>problem. Frequent reboots but very inconvenient for a server.
>
>Does anyone have instructions what information I can still gather to post 
>a bug report? The statement "connections in the TIME_WAIT status are not 
>degraded" are probably not sufficient to find the problem.
>
>
>Thank you for your efforts

Can you find what daemon/process is being connected to and from where?

christos



Re: blacklistd is now available for current (comments?)

2015-02-04 Thread Christos Zoulas
In article <201502040803.t1483mjm021...@server.cornerstoneservice.ca>,
John Nemeth   wrote:
>
> PAM wouldn't have access to the socket, so no it wouldn't be
>that easy to add.  Also, PAM is primarily for things that do
>interactive logins IMAP should really be using SASL.  However, that
>would probably have the same problem of not having access to the
>socket.

Well, not entirely true since PAM runs in the same process, but yes
trying to deduce which is the correct file descriptor to use is not
an exact science.

christos



Re: DoS attack against TCP services

2015-02-04 Thread 6bone

Hello,

The problem occurred again. The kernel has over 3,000 connections in 
TIME_WAIT state. The compounds are after an hour wait not disappeared. 
There are more and more connections in the TIME_WAIT state. My settings 
are:


net.inet.tcp.mslt.enable = 1
net.inet.tcp.mslt.loopback = 2
net.inet.tcp.mslt.local = 10
net.inet.tcp.mslt.remote = 60
net.inet.tcp.mslt.remote_threshold = 6

The last few times I have restarted the server in order to solve the 
problem. Frequent reboots but very inconvenient for a server.


Does anyone have instructions what information I can still gather to post 
a bug report? The statement "connections in the TIME_WAIT status are not 
degraded" are probably not sufficient to find the problem.



Thank you for your efforts


Regards
Uwe


On Mon, 19 Jan 2015, Michael van Elst wrote:


Date: Mon, 19 Jan 2015 19:51:31 + (UTC)
From: Michael van Elst 
To: current-users@netbsd.org
Newsgroups: lists.netbsd.current-users
Subject: Re: DoS attack against TCP services

b...@update.uu.se (Johnny Billquist) writes:


Timeout should not depend on distance, and should actually be (at least)
2*MSS, which would be something in the several minutes range.


It's 2*msl but msl can be a bit variable

net.inet.tcp.mslt.enable = 1
net.inet.tcp.mslt.loopback = 2
net.inet.tcp.mslt.local = 10
net.inet.tcp.mslt.remote = 60

If I understand this correctly, these msl values are in units of 500ms,
so 2*msl is the same value in seconds.

What is considered a local connection is a bit of magic and if you set
net.inet.tcp.mslt.enable=0 then everything is treated as a remote
connection.

--
--
   Michael van Elst
Internet: mlel...@serpens.de
   "A potential Snark may lurk in every tree."