From nobody Sun Nov 14 17:41:16 2021 X-Original-To: freebsd-net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id E88B8184B033 for ; Sun, 14 Nov 2021 17:41:18 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from fc.opsec.eu (fc.opsec.eu [IPv6:2001:14f8:200:4::4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4Hsfkk6LwDz3pvY; Sun, 14 Nov 2021 17:41:18 +0000 (UTC) (envelope-from pi@freebsd.org) Received: from pi by fc.opsec.eu with local (Exim 4.95 (FreeBSD)) (envelope-from ) id 1mmJVE-0008Ho-Hb; Sun, 14 Nov 2021 18:41:16 +0100 Date: Sun, 14 Nov 2021 18:41:16 +0100 From: Kurt Jaeger To: "Andrey V. Elsukov" Cc: tuexen@freebsd.org, freebsd-net@freebsd.org Subject: Re: dtrace to trace incoming connection not suceeding ? Message-ID: References: <866D4765-25EF-4C5F-AA2E-D6BE8D5EBEEB@freebsd.org> <43FC040E-E5DE-4F4E-B91E-AAA807207D05@freebsd.org> <36CCF1D0-34EE-4E1C-B593-71CF936F4DE7@freebsd.org> List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: 4Hsfkk6LwDz3pvY X-Spamd-Bar: ---- Authentication-Results: mx1.freebsd.org; none X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[] X-Spam: Yes X-ThisMailContainsUnwantedMimeParts: N Hi! > > There's one small diff between the two that I do not understand: > > > > - 18040 times no signature provided by segment > > + 18045 times no signature provided by segment > > This means, that received TCP segment has not TCP-MD5 signature, but > listen socket expects it. Such SYN segment will be dropped by syncache > code. Probably your BGP daemon configured to use TCP-MD5 for connection, > but remote side does not. Thanks, that might be another possible cause. This happened on iBGP sessions where I control both sides or on eBGP sessions, where I also control both sides (and both run on FreeBSD). I did not change the frr config during updates, so I did not expect this to break. Maybe frr on newer FreeBSD versions handles the tcp-md5 case in some invalid way. That might be the case and this probably needs to be analysed. -- pi@FreeBSD.org +49 171 3101372 Now what ?