From owner-freebsd-current@freebsd.org Fri May 20 13:51:13 2016 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A6757B43E77 for ; Fri, 20 May 2016 13:51:13 +0000 (UTC) (envelope-from zakharov.vv@gmail.com) Received: from mail-lf0-x229.google.com (mail-lf0-x229.google.com [IPv6:2a00:1450:4010:c07::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 2C42A1986 for ; Fri, 20 May 2016 13:51:13 +0000 (UTC) (envelope-from zakharov.vv@gmail.com) Received: by mail-lf0-x229.google.com with SMTP id e126so24437772lfg.2 for ; Fri, 20 May 2016 06:51:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=IbZBxEQmQa5Ofwn+DJ0wWQ9ZoN0o7BySlJ28MlrT5rA=; b=vmO9G5b+LYK2CIyC0C0u+wf2mTtxybQFNGDX8K+R/T0aeYuIMyC0FRsrpJfJ/7s6wr lZhTGIeWyX5gcriGt1vtkaEU6ycFTVJwPLi8OHC7XU9OrV5sO6kaqTOYQ8aIU2eA6sku LWN93/i2ZV2dygY1QmmIATCwNdLh8ykbICEg8Yxa/Y4sruTxDoNff8Pfdfv0xV5/Q8H+ 72MonxajvS5SXk3Ms136GkkODQ4w3D/thPmzQwdKuk159UQqBohtkEE/zjtcUE7SPPvz unIdm5tzXWTLsZwI3/nkAbwE7S9xGwLYxvBko38SvAJoqf7fvx2ex8TVR7lt1swpmfCT ltBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=IbZBxEQmQa5Ofwn+DJ0wWQ9ZoN0o7BySlJ28MlrT5rA=; b=jhk0H21OfG9mKjVw/w9IwYQB0fciDHdrYtxtprAcDKJSDhG+zLYhIYCJhVwlug1xPN PKsKtTg9HjdpDZlmgP8laQXtjV+vYUgEO4MZ0sluxV5IiNxusVVo2HDsOxEHZ94oQ+UQ b4vfsE1VToDOf5a5bycYgOHEgG2sO3M4nRRC7jg5OjxLq0Tu743f9JGnzt2j90OiokJM 4JQfbsZmGx6b4wQwsNlG2zTJp4jHzIdoNWfQ3ntaNCdJV9VXOBxjyI2ugSvKRJ8M1Cgw LWVV+eFlNJNIiyszZB0nxDM24AWCSLbhJvmYbhHJcb6yvfisWQg8v4KoiOCk+oqnMdDA 6wjA== X-Gm-Message-State: AOPr4FVtfjdI7Z1N7x2UQ+sqbjVSb7N/0T7/L2zOmLJjDKhOy/Q+zcIeTVGCPTYwiHa+SA== X-Received: by 10.25.145.19 with SMTP id t19mr1197608lfd.109.1463752271477; Fri, 20 May 2016 06:51:11 -0700 (PDT) Received: from localhost ([81.19.73.103]) by smtp.gmail.com with ESMTPSA id 75sm1054031lfw.25.2016.05.20.06.51.10 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 20 May 2016 06:51:10 -0700 (PDT) Date: Fri, 20 May 2016 16:51:09 +0300 From: Vladimir Zakharov To: Jan Bramkamp Cc: freebsd-current@freebsd.org Subject: Re: CURRENT: ipfw: problems with timeouts and worse network performance Message-ID: <20160520135109.GD2371@vzakharov> References: <20160520140152.3ab6fe44@hermann> <20160520125401.GC2371@vzakharov> <38888426-4d91-56ed-9ab3-0d516b0b8d46@rlwinm.de> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <38888426-4d91-56ed-9ab3-0d516b0b8d46@rlwinm.de> X-Operating-System: FreeBSD 11.0-CURRENT amd64 User-Agent: Mutt/1.6.1 (2016-04-27) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 May 2016 13:51:13 -0000 On Fri, May 20, 2016, Jan Bramkamp wrote: > On 20/05/16 14:54, Vladimir Zakharov wrote: > > Hello > > > > On Fri, May 20, 2016, O. Hartmann wrote: > >> I reported earlier about broken pipes in ssh sessions to remote hosts, > >> which occur on an erratic basis. i'm investigating this problem now and > >> it seems that it is also ipfw-related, but I'm not sure. This problem > >> is present since a couple of weeks now. > > > > Maybe this could help... > > > > I've also experienced problems with broken pipes in ssh sessions some > > time ago. Setting in sysctl.conf > > > > net.inet.ip.fw.dyn_ack_lifetime=3600 > > > > fixed problem for me. I didn't experiment with the value though. So, > > possibly, changing default value (300s) to 1 hour is overkill :). > > By default the OpenSSH SSH client is configured to use TCP keepalives. > Those should produce enough packets at a short enough interval to keep > the dynamic IPFW state established. > > Does your traffic pass through libalias? I guess not. How can I be sure? -- Regards, | "In theory there is no difference between theory Vladimir Zakharov | and practice. In practice there is."- Yogi Berra