lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 12 May 2009 08:11:19 -0700
From:	Stephen Hemminger <shemminger@...tta.com>
To:	Octavian Purdila <opurdila@...acom.com>
Cc:	netdev@...r.kernel.org, Bill Fink <billfink@...dspring.com>,
	Eric Dumazet <dada1@...mosbay.com>
Subject: Re: ports beeing reused too fast

On Tue, 12 May 2009 15:32:57 +0300
Octavian Purdila <opurdila@...acom.com> wrote:

> 
> > > > >> Any strong reason why a firewall would drop a SYN because ports were
> > > > >> used in a previous session ?
> > > > >
> > > > > We don't know why the firewall (Cisco FWSM) is dropping the packets,
> > > > > may be a bug, limitation or miss-configuration. We are trying to
> > > > > track this down with the firewall vendor.
> > > >
> 
> Interestingly, we are seeing the same behavior with another high-end firewall 
> (Juniper SRX). 
> 
> As mentioned previously, this can not be caused by the TW state, because the 
> connections are getting closed on the server side.
> 
> Thanks,
> tavi

I raised the issue to the original author of the proposed RFC and added
the issue to the ongoing review of the draft.

There is a suggested workaround using a bitmap but it seems like it would be
expensive to implement:
       http://ietfreport.isoc.org/all-ids/draft-ananth-tsvwg-timewait-00.txt

-- 
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists