* Re: conntrackd, internal cache keeps filling up
[not found] ` <20140510061743.GA32197@finrod>
@ 2014-05-12 16:35 ` Pablo Neira Ayuso
2014-05-13 11:45 ` Martin Kraus
2014-07-11 16:27 ` Martin Kraus
0 siblings, 2 replies; 7+ messages in thread
From: Pablo Neira Ayuso @ 2014-05-12 16:35 UTC (permalink / raw)
To: Martin Kraus; +Cc: netfilter-devel, netfilter
On Sat, May 10, 2014 at 08:17:45AM +0200, Martin Kraus wrote:
> On Fri, May 09, 2014 at 01:31:29PM +0200, Pablo Neira Ayuso wrote:
> > > There's thousands of these entries and in a few days they'll fill up the
> > > internal cache and break internal routing.
> >
> > Could you retry with lastest conntrackd version? 1.4.2.
>
> will try 1.4.2. we just need to package it.
OK.
> > You didn't specify your Linux kernel version either. Thanks.
>
> current kernel is 3.13.7.
>
> we already hit a bug in the official 3.2 kernel packaged with wheezy where
> our scan for heartbleed vulnerability would cause conntrackd to kernel panic
> the router.
Please, provide more information on how to reproduce the problem that
you're noticing. Thank you.
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: conntrackd, internal cache keeps filling up
2014-05-12 16:35 ` conntrackd, internal cache keeps filling up Pablo Neira Ayuso
@ 2014-05-13 11:45 ` Martin Kraus
2014-05-13 12:04 ` Florian Westphal
2014-05-13 12:40 ` Pablo Neira Ayuso
2014-07-11 16:27 ` Martin Kraus
1 sibling, 2 replies; 7+ messages in thread
From: Martin Kraus @ 2014-05-13 11:45 UTC (permalink / raw)
To: Pablo Neira Ayuso; +Cc: netfilter-devel, netfilter
On Mon, May 12, 2014 at 06:35:38PM +0200, Pablo Neira Ayuso wrote:
> > current kernel is 3.13.7.
> >
> > we already hit a bug in the official 3.2 kernel packaged with wheezy where
> > our scan for heartbleed vulnerability would cause conntrackd to kernel panic
> > the router.
>
> Please, provide more information on how to reproduce the problem that
> you're noticing. Thank you.
regarding the kernel panic on 3.2 a colleague of mine was using nmap with it's
heartbleed plugin
nmap --script ssl-heartbleed -sT -oX logfile.log 10.0.0.0/20
http://nmap.org/nsedoc/scripts/ssl-heartbleed.html
it took about 30 minutes to trigger the problem.
regarding the internal cache fill up. we have two routers and some vlans using
one and some vlans using the other router as the default gateway.
this is the conntrackd config on both routers.
Sync {
Mode FTFW {
ResendQueueSize 131072
ACKWindowSize 300
DisableExternalCache On
}
UDP {
IPv4_address 192.168.100.200
IPv4_Destination_Address 192.168.100.100
Port 3780
Interface eth0
Checksum on
}
Options {
TCPWindowTracking On
}
}
General {
Nice -20
HashSize 65536
HashLimit 262144
Syslog on
LockFile /var/lock/conntrack.lock
UNIX {
Path /var/run/conntrackd.ctl
Backlog 20
}
NetlinkBufferSize 2097152
NetlinkBufferSizeMaxGrowth 8388608
NetlinkEventsReliable On
NetlinkOverrunResync Off
Filter From Kernelspace {
Address Ignore {
IPv4_address 127.0.0.1 # loopback
}
}
}
We have about 80 users, some of them running window or macs, so there is
plenty of multicasts and broadcasts that fill the conntrack table. some of
these then get stuck in the conntrackd internal cache. We can see the
LAST_ACK tcp states stuck in the internal cache as well, but I think these are
related to TCPWindowTracking On.
mk
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: conntrackd, internal cache keeps filling up
2014-05-13 11:45 ` Martin Kraus
@ 2014-05-13 12:04 ` Florian Westphal
2014-05-13 12:55 ` Pablo Neira Ayuso
2014-05-13 12:40 ` Pablo Neira Ayuso
1 sibling, 1 reply; 7+ messages in thread
From: Florian Westphal @ 2014-05-13 12:04 UTC (permalink / raw)
To: Martin Kraus; +Cc: Pablo Neira Ayuso, netfilter-devel, netfilter
Martin Kraus <lists_mk@wujiman.net> wrote:
> On Mon, May 12, 2014 at 06:35:38PM +0200, Pablo Neira Ayuso wrote:
> > > current kernel is 3.13.7.
> > >
> > > we already hit a bug in the official 3.2 kernel packaged with wheezy where
> > > our scan for heartbleed vulnerability would cause conntrackd to kernel panic
> > > the router.
> >
> > Please, provide more information on how to reproduce the problem that
> > you're noticing. Thank you.
>
> regarding the kernel panic on 3.2 a colleague of mine was using nmap with it's
> heartbleed plugin
>
> nmap --script ssl-heartbleed -sT -oX logfile.log 10.0.0.0/20
>
> http://nmap.org/nsedoc/scripts/ssl-heartbleed.html
>
> it took about 30 minutes to trigger the problem.
[..]
> NetlinkEventsReliable On
known broken until at least Linux 3.6, see f.e.
5b423f6a40a0327f9d40bc8b97ce9be266f74368
("netfilter: nf_conntrack: fix racy timer handling with reliable events")
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: conntrackd, internal cache keeps filling up
2014-05-13 11:45 ` Martin Kraus
2014-05-13 12:04 ` Florian Westphal
@ 2014-05-13 12:40 ` Pablo Neira Ayuso
2014-05-13 14:57 ` Martin Kraus
1 sibling, 1 reply; 7+ messages in thread
From: Pablo Neira Ayuso @ 2014-05-13 12:40 UTC (permalink / raw)
To: Martin Kraus; +Cc: netfilter-devel, netfilter
On Tue, May 13, 2014 at 01:45:35PM +0200, Martin Kraus wrote:
> On Mon, May 12, 2014 at 06:35:38PM +0200, Pablo Neira Ayuso wrote:
> > > current kernel is 3.13.7.
> > >
> > > we already hit a bug in the official 3.2 kernel packaged with wheezy where
> > > our scan for heartbleed vulnerability would cause conntrackd to kernel panic
> > > the router.
> >
> > Please, provide more information on how to reproduce the problem that
> > you're noticing. Thank you.
>
> regarding the kernel panic on 3.2 a colleague of mine was using nmap with it's
> heartbleed plugin
>
> nmap --script ssl-heartbleed -sT -oX logfile.log 10.0.0.0/20
>
> http://nmap.org/nsedoc/scripts/ssl-heartbleed.html
>
> it took about 30 minutes to trigger the problem.
Did you annotate the kernel oops backtrace? Without that information,
this is pretty much like looking for the needle in the stack.
> regarding the internal cache fill up. we have two routers and some vlans using
> one and some vlans using the other router as the default gateway.
>
> this is the conntrackd config on both routers.
>
> Sync {
> Mode FTFW {
> ResendQueueSize 131072
> ACKWindowSize 300
> DisableExternalCache On
> }
> UDP {
> IPv4_address 192.168.100.200
> IPv4_Destination_Address 192.168.100.100
> Port 3780
> Interface eth0
> Checksum on
> }
> Options {
> TCPWindowTracking On
> }
> }
>
> General {
> Nice -20
>
> HashSize 65536
> HashLimit 262144
>
> Syslog on
> LockFile /var/lock/conntrack.lock
> UNIX {
> Path /var/run/conntrackd.ctl
> Backlog 20
> }
>
> NetlinkBufferSize 2097152
> NetlinkBufferSizeMaxGrowth 8388608
> NetlinkEventsReliable On
> NetlinkOverrunResync Off
>
> Filter From Kernelspace {
> Address Ignore {
> IPv4_address 127.0.0.1 # loopback
> }
> }
> }
>
> We have about 80 users, some of them running window or macs, so there is
> plenty of multicasts and broadcasts that fill the conntrack table. some of
> these then get stuck in the conntrackd internal cache. We can see the
> LAST_ACK tcp states stuck in the internal cache as well, but I think these are
> related to TCPWindowTracking On.
Did you retry with lastest conntrack-tools version? If so, please
collect as much information as you can via all -s options, moreover
check the logs. If you didn't retry with lastest, please upgrade.
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: conntrackd, internal cache keeps filling up
2014-05-13 12:04 ` Florian Westphal
@ 2014-05-13 12:55 ` Pablo Neira Ayuso
0 siblings, 0 replies; 7+ messages in thread
From: Pablo Neira Ayuso @ 2014-05-13 12:55 UTC (permalink / raw)
To: Florian Westphal; +Cc: Martin Kraus, netfilter-devel, netfilter
On Tue, May 13, 2014 at 02:04:00PM +0200, Florian Westphal wrote:
> Martin Kraus <lists_mk@wujiman.net> wrote:
> > On Mon, May 12, 2014 at 06:35:38PM +0200, Pablo Neira Ayuso wrote:
> > > > current kernel is 3.13.7.
> > > >
> > > > we already hit a bug in the official 3.2 kernel packaged with wheezy where
> > > > our scan for heartbleed vulnerability would cause conntrackd to kernel panic
> > > > the router.
> > >
> > > Please, provide more information on how to reproduce the problem that
> > > you're noticing. Thank you.
> >
> > regarding the kernel panic on 3.2 a colleague of mine was using nmap with it's
> > heartbleed plugin
> >
> > nmap --script ssl-heartbleed -sT -oX logfile.log 10.0.0.0/20
> >
> > http://nmap.org/nsedoc/scripts/ssl-heartbleed.html
> >
> > it took about 30 minutes to trigger the problem.
> [..]
>
> > NetlinkEventsReliable On
>
> known broken until at least Linux 3.6, see f.e.
>
> 5b423f6a40a0327f9d40bc8b97ce9be266f74368
> ("netfilter: nf_conntrack: fix racy timer handling with reliable events")
If they are using latest 3.2, that patch is already there.
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: conntrackd, internal cache keeps filling up
2014-05-13 12:40 ` Pablo Neira Ayuso
@ 2014-05-13 14:57 ` Martin Kraus
0 siblings, 0 replies; 7+ messages in thread
From: Martin Kraus @ 2014-05-13 14:57 UTC (permalink / raw)
To: Pablo Neira Ayuso; +Cc: netfilter-devel, netfilter
On Tue, May 13, 2014 at 02:40:44PM +0200, Pablo Neira Ayuso wrote:
> > it took about 30 minutes to trigger the problem.
>
> Did you annotate the kernel oops backtrace? Without that information,
> this is pretty much like looking for the needle in the stack.
Unfortunately we don't have any other information. I could reboot to the old
kernel and trigger it again but I'll need to do that in the evening.
Is there a better way to get the oops backtrace than a redirect to the serial
console?
mk
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: conntrackd, internal cache keeps filling up
2014-05-12 16:35 ` conntrackd, internal cache keeps filling up Pablo Neira Ayuso
2014-05-13 11:45 ` Martin Kraus
@ 2014-07-11 16:27 ` Martin Kraus
1 sibling, 0 replies; 7+ messages in thread
From: Martin Kraus @ 2014-07-11 16:27 UTC (permalink / raw)
To: Pablo Neira Ayuso; +Cc: netfilter-devel, netfilter
On Mon, May 12, 2014 at 06:35:38PM +0200, Pablo Neira Ayuso wrote:
> > will try 1.4.2. we just need to package it.
Hi.
we've been running 1.4.2 since the end of May but the problem persists. We've
managed to keep it down to a restart once a month through NOTRACK rules but
that's not a nice solution.
> Please, provide more information on how to reproduce the problem that
> you're noticing. Thank you.
We have two office routers (router1, router2) which are connected to our internal
vlans and then to the uplinks. Both routers are active and there is a dedicated
line used for conntrackd synchronization.
An example of state that keeps filling the conntrackd internal cache is dns
traffic to our nat64 proxy.
A user from vlan6 goes to our nat64 proxy in vlan20. vlan6 has a default
gateway to router2, vlan20 has a default gateway to vlan1.
User ipv6 address is 2001:1488:fffe:6:c941:fae:4505:7a22.
Nat64 ipv6 address is 2001:1488:fffe:20::34.
The dns packet from the user goes to router2 and then directly to vlan20 where the
nat64 host is located.
The dns reply packet from nat64 then goes to router1 and then directly to
vlan6 back to the user.
Now on router2 when I run conntrackd -i I can see
udp 17 src=2001:1488:fffe:6:c941:fae:4505:7a22 dst=2001:1488:fffe:20::34 sport=6728 dport=53 [UNREPLIED] src=2001:1488:fffe:20::34 dst=2001:1488:fffe:6:c941:fae:4505:7a22 sport=53 dport=6728 [active since 192159s]
udp 17 src=2001:1488:fffe:6:c941:fae:4505:7a22 dst=2001:1488:fffe:20::34 sport=6961 dport=53 [UNREPLIED] src=2001:1488:fffe:20::34 dst=2001:1488:fffe:6:c941:fae:4505:7a22 sport=53 dport=6961 [active since 191949s]
udp 17 src=2001:1488:fffe:6:c941:fae:4505:7a22 dst=2001:1488:fffe:20::34 sport=6977 dport=53 [UNREPLIED] src=2001:1488:fffe:20::34 dst=2001:1488:fffe:6:c941:fae:4505:7a22 sport=53 dport=6977 [active since 191962s]
udp 17 src=2001:1488:fffe:6:c941:fae:4505:7a22 dst=2001:1488:fffe:20::34 sport=6979 dport=53 [UNREPLIED] src=2001:1488:fffe:20::34 dst=2001:1488:fffe:6:c941:fae:4505:7a22 sport=53 dport=6979 [active since 168352s]
and another 126000 entries like this. router1 is similar except that the state
is not UNREPLIED. kernel conntrack table doesn't have any of these entries.
Interesting thing is that it's usually 1 ipv[46] address that generates most
of these stale entries.
This is the config file used
Sync {
Mode FTFW {
ResendQueueSize 131072
ACKWindowSize 300
DisableExternalCache On
}
UDP {
IPv4_address 192.168.100.100
IPv4_Destination_Address 192.168.100.200
Port 3780
Interface eth0
Checksum on
}
Options {
TCPWindowTracking On
}
}
General {
Nice -20
HashSize 65536
HashLimit 262144
Syslog on
LockFile /var/lock/conntrack.lock
UNIX {
Path /var/run/conntrackd.ctl
Backlog 20
}
NetlinkBufferSize 2097152
NetlinkBufferSizeMaxGrowth 8388608
NetlinkEventsReliable Off
NetlinkOverrunResync On
Filter From Kernelspace {
Address Ignore {
IPv4_address 127.0.0.1 # loopback
}
}
}
I always assumed that the internal cache is a copy of the kernel conntrack table
plus entries that have not yet been synchronized to the other router so I
don't understand why is it getting this huge.
mk
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2014-07-11 16:36 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <20140505104058.GA30297@finrod>
[not found] ` <20140509113129.GA8031@localhost>
[not found] ` <20140510061743.GA32197@finrod>
2014-05-12 16:35 ` conntrackd, internal cache keeps filling up Pablo Neira Ayuso
2014-05-13 11:45 ` Martin Kraus
2014-05-13 12:04 ` Florian Westphal
2014-05-13 12:55 ` Pablo Neira Ayuso
2014-05-13 12:40 ` Pablo Neira Ayuso
2014-05-13 14:57 ` Martin Kraus
2014-07-11 16:27 ` Martin Kraus
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).