On 27/05/07, Tom Eastep <[EMAIL PROTECTED]> wrote: > The problem is caused by 'out-of-window' packets. So to totally analyze > the problem, you may have to capture: > > a) The SCP stream on the outer interface of the other firewall. > b) The SCP stream on the outer interface of the Shorewall box. > c) Invalid connection state packets (I sent instructions earlier). > > Once you find out which packets are being dropped (c), then you can > compare those packets in (a) and (b) to see if the other firewall is > mangling them. If not, then you need to send (b) and (c) to the > netfilter developers for analysis.
OK, thanks for the info. Alas, (a) isn't accesible to me, but I'll spend some time seeing if I can see anything suspect in (b). > > tcp_be_liberal (which you are setting) turns off Netfilter > window-tracking except for RST packets so you will need to turn of > tcp_be_liberal while tracking this down. > OK. Thanks once again for your help and patience. Jonathan. ------------------------------------------------------------------------- This SF.net email is sponsored by DB2 Express Download DB2 Express C - the FREE version of DB2 express and take control of your XML. No limits. Just data. Click to get it now. http://sourceforge.net/powerbar/db2/ _______________________________________________ Shorewall-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-users
