All of lore.kernel.org
 help / color / mirror / Atom feed
* RST packets
@ 2005-07-18 14:04 Jan Engelhardt
  2005-07-18 14:12 ` Rob Sterenborg
                   ` (3 more replies)
  0 siblings, 4 replies; 12+ messages in thread
From: Jan Engelhardt @ 2005-07-18 14:04 UTC (permalink / raw)
  To: Netfilter User Mailing List

Hi,


a simple question, though I could not clearly read it from the TCP RFC...
do RST packets always have ACK set?


Jan Engelhardt
-- 


^ permalink raw reply	[flat|nested] 12+ messages in thread
* Re: RST packets
@ 2005-07-21  6:43 Jan Engelhardt
  2005-07-21  7:42 ` Rob Sterenborg
  2005-07-21 10:56 ` Jörg Harmuth
  0 siblings, 2 replies; 12+ messages in thread
From: Jan Engelhardt @ 2005-07-21  6:43 UTC (permalink / raw)
  To: Netfilter User Mailing List

Hi,


>http://www.knowplace.org/netfilter/ip_overview.html

|Sometimes, if either hosts need to tear down the connection quickly (timeout, 
|port or host unreachable, etc.), a RST (Reset) packet is sent. Note that 
|since a RST packet is not necessarily always part of a TCP connection, it can be 
|sent by itself. RST packets that are part of a TCP connection is usually 
|accompanied by the ACK flag as well.

What would be the use of RST if it is not part of a connection?
Is it...vv?
  A and B are connected
  A crashes
  B tries to send
  A sends RST,!ACK



Jan Engelhardt
-- 


^ permalink raw reply	[flat|nested] 12+ messages in thread
* RST packets
@ 2004-08-11 21:00 Peter Marshall
  2004-08-12 16:58 ` Peter Marshall
  0 siblings, 1 reply; 12+ messages in thread
From: Peter Marshall @ 2004-08-11 21:00 UTC (permalink / raw)
  To: netfilter

I am having a problem now where I am getting RST packets being blocked from
my internal network heading out to the external network.  It looks like RST
packets are used to stop a TCP connection when there is a problem.

The setup is like this:
I have a web box in my dmz that people connect to.  A mod-jk connection is
made through my firewall, and the responses are allowed back with the
standard ESTABLISHED,RELATED allow on the Forward chain.

I guess I was wondering why I was getting a bunch of RST packets and also,
why the firewall was blocking them.  Would they not be part of the
ESTABLISED-RELATED chain ?

Here are the relevant rules.
$IPT -A FORWARD -p TCP -m state --state ESTABLISHED,RELATED -j ACCEPT

$IPT -A FORWARD -s $WEB_BOX_IP -I eth1 -j web-int
$IPT -A web-int -d 192.168.202.168 -p tcp --dport 8009:8020 -j ACCEPT

I do have a chain for int-web ... which is used to connect to a webserver
running on it ..(and it rejects everything else).  This is the chain that
the RST packet is making it too and is then getting rejected.  However, I
did not think that the packet should reach this chain as it is related (or
establised) to the web-int connection ...

Any suggestions would be greatly appreciated.  My network set up is a DMZ
between two firewalls.  The web box is in the DMZ.  The "int" in my chains
is my internal network.  the internal network is separated form the DMZ by a
firewall.

Peter Marshall



^ permalink raw reply	[flat|nested] 12+ messages in thread

end of thread, other threads:[~2005-07-27  5:28 UTC | newest]

Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2005-07-18 14:04 RST packets Jan Engelhardt
2005-07-18 14:12 ` Rob Sterenborg
2005-07-18 16:39 ` R. DuFresne
2005-07-18 18:27 ` Jozsef Kadlecsik
2005-07-27  5:28 ` Grant Taylor
  -- strict thread matches above, loose matches on Subject: below --
2005-07-21  6:43 Jan Engelhardt
2005-07-21  7:42 ` Rob Sterenborg
2005-07-21 10:56 ` Jörg Harmuth
2004-08-11 21:00 Peter Marshall
2004-08-12 16:58 ` Peter Marshall
2004-08-13 15:17   ` Chris Brenton
2004-08-16 12:17     ` Peter Marshall

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.