WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] ip conntrack table full

To: xen-users@xxxxxxxxxxxxxxxxxxx
Subject: Re: [Xen-users] ip conntrack table full
From: jim burns <jim_burn@xxxxxxxxxxxxx>
Date: Mon, 25 Jan 2010 05:08:52 -0500
Delivery-date: Mon, 25 Jan 2010 02:10:13 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: KMail/1.13.0 (Linux/2.6.31.8-0.1-default; KDE/4.3.95; i686; ; )
On Mon, Jan 25, 2010, Fajar A. Nugraha wrote:
>On Mon, Jan 25, 2010 at 7:00 AM, Mike McGrath <mmcgrath@xxxxxxxxxx> wrote:
>> Ok, that is a good indicator.  I can see things contacting port 443, which
>> is what should be on the domU.  I'm also seeing lots of established
>> connections that aren't showing up in netstat.  So it's like the dom0 is
>> tracking the domU's iptables, but is not releasing them?

> Have you look at each domU's conntrack count (assuming they also have
> iptables enabled)? Most likely if you add up all of them it'd match
> dom0's count.

> If the load is what you expect (i.e. no portscan/attacks), and you
> don't use dom0 as firewall (just a router), then perhaps you should
> simply just disable iptables on dom0. Another alternative is to
> increase max conntrack, or reduce conntrack timeouts on dom0.

> -- 
> Fajar

This whole conntrack design strikes me as a serious bug that can lead to DOS 
attacks, even assuming that the counter is 32 bits. And I'm not comfortable 
with dom0 "snooping"/recording traffic on domu, isolation wise. (Yeah, I know, 
anybody can run tcpdump or wireshark on bridged traffic, but this is all being 
recorded. At least it's not world readable.)

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users