Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 10 Sep 2010 13:49:08 +0200
From:      Gareth de Vaux <bsd@lordcow.org>
To:        stable@freebsd.org
Subject:   Re: ipfw: Too many dynamic rules
Message-ID:  <20100910114908.GA55978@lordcow.org>
In-Reply-To: <20100909162009.GA80375@icarus.home.lan>
References:  <20100909153902.GA28341@lordcow.org> <20100909162009.GA80375@icarus.home.lan>

index | next in thread | previous in thread | raw e-mail

On Thu 2010-09-09 (09:20), Jeremy Chadwick wrote:
> Secondly, I'm fairly certain HTTP KeepAlive (re: KeepAliveTimeout) are
> unrelated to TCP keepalives[1].  I mention this because you're focusing
> on netstat, which will give you indication of TCP session state, not
> HTTP protocol statefulness. 

Gotcha

> Thirdly, if you feel FIN_WAIT2 is the cause of your problem, then you
> should consider adjusting the following sysctl:
> 
> net.inet.tcp.finwait2_timeout
> 
> Try something like 15000 (15 seconds) instead of the default (60000).

Ok that seems to be doing something. Will report back later.

> Finally, why are you using dynamic firewall rules at all?

So that I can identify legitimate(ish) traffic and drop the rest.

> For what purpose do you need these that, say, pf and its state
> tracking would not suffice?

I haven't used pf. I started with ipfw and its done the trick so far.
What's the difference between pf and ipfw's state tracking in this
respect?


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100910114908.GA55978>