On 2009-09-21, Claudio Jeker <cje...@diehard.n-r-g.com> wrote:
> On Mon, Sep 21, 2009 at 09:44:34AM +0200, Janne Johansson wrote:
>> Ian Chard wrote:
>> > I'm troubleshooting a very strange problem, where my ssh connection to a
>> > few different OpenBSD machines drops suddenly, with the client machine
>> > receiving a TCP RST from the server.  I've taken tcpdump captures on
>> > both sides (in different sessions, so the tcpdump process doesn't die
>> > with my shell), and the OpenBSD machine's capture doesn't log the RST it
>> > apparently sends.

You mentioned a complex network environment - any firewalls (especially
stateful ones) involved?

>> There are ISPs that "traffic shape" their links by killing long-lasting
>> TCP streams by faking the RST in the middle.
>> 
>
> pf(4) does this as well, if the state times out (the default timeout for
> established sessions is around a day). Many other systems behave
> similar (sometimes with much shorter timeouts). Enabling ssh keepalive
> helps.
>

I think those pf(4)-generated RST would show up through bpf, though -
at least they do if you "block return", I guess it's the same when tearing
down an established session.

Reply via email to