Wireshark mailing list archives

Re: Problem with ip spoofing load balancing


From: Niccolò Belli <darkbasic () linuxsystems it>
Date: Wed, 26 Oct 2011 22:38:55 +0200

Il 26/10/2011 21:43, Julian Anastasov ha scritto:
        I looked at broken-spoofing-server.pcap and
broken-spoofing-client.pcap

        It looks like that this packet comes after some
packet that is dropped before server:

IP 2.119.245.36.80>  88.38.77.130.39243: Flags [P.], seq 1449:1534, ack 602, win 438, options [nop,nop,TS val 17124611 
ecr 56937089], length 85

        May be the seq 1:1449 packet can not reach 2.119.245.36.80,
that is why it does not go to client 88.38.77.130.39243.
May be server is a virtual server or something like that.

        I guess someone before 2.119.245.36.80 is sending
large packets and some MTU is low and may be due to missing
ICMP the sender there can not learn the lower path MTU.
May be client can use ip route add ... advmss 1400 to check
if problem is fixed that way. May be there is some tunnel
behind the server that uses lower MTU.

        Note that some 3.0.X kernels have problem that
ICMP is not sent and this can cause PMTU problems.

SOLVED! Thanks Julian Anastasov.

Niccolò
___________________________________________________________________________
Sent via:    Wireshark-users mailing list <wireshark-users () wireshark org>
Archives:    http://www.wireshark.org/lists/wireshark-users
Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
            mailto:wireshark-users-request () wireshark org?subject=unsubscribe

Current thread: