Thanks, Emanuele. I can confirm that I am no longer receiving alerts for HTTP request/replies.
Aaron On Mon, May 25, 2020 at 5:18 AM Emanuele Faranda <fara...@ntop.org> wrote: > Hi Aaron, > > ntopng did not account the ethernet frame padding which resulted in the > ACK packets to be parsed as HTTP replies, so the actual HTTP reply in > subsequent packets were ignored. This is fixed in > https://github.com/ntop/ntopng/commit/cba3ab2ea6258895fa7270330607f491fa942c47 > . A new package will be available in one hour. Please kindly confirm that > it work on the live traffic. > > Regards, > > Emanuele > On 5/22/20 7:11 AM, Aaron Scamehorn wrote: > > Hi Emanuele, > > It's been about 9 days since adding the ignore_vlan option. The behavior > has definitely changed, however, I continue to get Replies / Requests Ratio > alerts. > > I get far fewer alerts for DNS. As mentioned earlier, I am now getting > alerts for HTTP. Over 600 in the last 9 days: > > "msg": "Host edgemax has received 117 HTTP requests but sent 51 HTTP > replies [5 Minutes ratio: 43.2%] " > "msg": "Host edgemax has received 117 HTTP requests but sent 51 HTTP > replies [5 Minutes ratio: 43.2%] " > "msg": "Host edgemax has received 117 HTTP requests but sent 51 HTTP > replies [5 Minutes ratio: 43.2%] " > "msg": "Host edgemax has received 117 HTTP requests but sent 51 HTTP > replies [5 Minutes ratio: 43.2%] " > "msg": "Host edgemax has received 118 HTTP requests but sent 51 HTTP > replies [5 Minutes ratio: 42.9%] " > "msg": "Host edgemax has received 100 HTTP requests but sent 34 HTTP > replies [5 Minutes ratio: 33.7%] " > "msg": "Host edgemax has received 78 HTTP requests but sent 34 HTTP > replies [5 Minutes ratio: 43.0%] " > > The duration is usually 10 minutes or less. > > I've sent you a PCAP file to reproduce. > > Aaron > > > On Fri, May 15, 2020 at 4:26 AM Emanuele Faranda <fara...@ntop.org> wrote: > >> Hi Aaron, >> >> The alerts on HTTP traffic should not be linked to the --ignore-vlan >> option, as adding such option should actually improve the requests vs reply >> ratio also in case of HTTP so I expect less alerts to be generated than >> before. >> >> Anyway, please monitor the situation and if you still think that there is >> such a problem please provide a PCAP file privately with the HTTP traffic >> so that we can inspect it. >> >> Regards, >> >> Emanuele >> On 5/13/20 4:55 PM, Aaron Scamehorn wrote: >> >> Interesting. I do recall seeing vlan tags on some but not all of the >> flows in ntopng. >> >> Looking at the pcaps now, I do see that traffic from the 2 pi-hole hosts >> have vlan tags whereas other hosts have no vlan tag. So, the switch that >> the pi-holes is adding vlan tags? >> >> Anyway, I ran the 30 minute pcap file with the --ignore-vlan config, and >> agree that does resolve the issue with the pcap file. >> >> Adding that config to the "prod" ntopng apparently introduces new >> problems. I am now getting Replies / Requests Ratio alerts for HTTP on >> various hosts. I have not seen these alerts before. These do not have the >> prolonged duration that the DNS alerts were having; rather, these are all >> of the 5 minute duration. >> >> Could this be a boundary issue? Could client send the requests in one 5 >> minute window, and the responses are on the next 5 minute window? >> >> Aaron >> >> >> >> >> On Wed, May 13, 2020 at 8:48 AM Emanuele Faranda <fara...@ntop.org> >> wrote: >> >>> Aaron, >>> >>> Writing to you here to continue the public discussion. The problem is >>> that the DNS requests have no VLAN tag whereas the DNS replies have the >>> VLAN tag 1. So ntopng splits the DNS flows in two monodirectional flows. If >>> you want to ignore the VLAN tag in ntopng you can use the --ignore-vlans >>> flag in ntopng. This should fix your problem. >>> >>> Regards, >>> >>> Emanuele >>> On 5/13/20 3:06 PM, Emanuele Faranda wrote: >>> >>> Hi Aaron, >>> >>> Please contact us privately at fara...@ntop.org and maina...@ntop.org . >>> Please ensure that the PCAP files only contain DNS traffic. >>> >>> Regards, >>> >>> Emanuele >>> On 5/12/20 5:13 PM, Aaron Scamehorn wrote: >>> >>> Emanuele, >>> >>> Here is ntopng.conf >>> -G=/var/run/ntopng.pid >>> -i=enp2s0 >>> -m=10.12.17.0/24 >>> -S=local >>> >>> I do see unidirectional flows in flows_stats.lua for DNS. Incidentally, >>> I do also see alerts w/ non-zero replies (though most alerts are 0): >>> Host pihole has sent 211 DNS requests but received 7 DNS replies >>> >>> I tried 2 different 30 minute PCAP files. In both cases, right at the >>> 10 minute mark, I got alerts. How can I get these PCAP files to you? >>> >>> Thanks, >>> Aaron >>> >>> >>> >>> On Tue, May 12, 2020 at 4:13 AM Emanuele Faranda <fara...@ntop.org> >>> wrote: >>> >>>> Hi Aaron, >>>> >>>> Please see below. >>>> On 5/11/20 9:29 PM, Aaron Scamehorn wrote: >>>> >>>> Hi Emanuele, >>>> >>>> Thank you again for the detailed responses. >>>> >>>> From the interfaces page, I see these stats: >>>> Total Traffic 91.6 GB [103,062,265 Pkts] Dropped Packets 0 Pkts >>>> I don't see any dropped packets on the NIC either: >>>> ethtool -S enp2s0 >>>> NIC statistics: >>>> tx_packets: 0 >>>> rx_packets: 106581943 >>>> tx_errors: 0 >>>> rx_errors: 0 >>>> rx_missed: 0 >>>> align_errors: 0 >>>> tx_single_collisions: 0 >>>> tx_multi_collisions: 0 >>>> unicast: 105432876 >>>> broadcast: 350738 >>>> multicast: 1149060 >>>> tx_aborted: 0 >>>> tx_underrun: 0 >>>> >>>> As of right now, 2 of the hosts we are discussing are still in alert, >>>> at the original Date/Time of 07:25:01, and Duration is now "3 Days, >>>> 08:06:59". >>>> >>>> Given that my replies vs requests ratio is still configured at 50%, >>>> this means that, at every 5 minute interval for the last 3 Days, 8 hours, >>>> said host is receiving < 50% DNS replies, correct? I find this difficult >>>> to believe, and cannot find ANY missing packets in my pcap file. >>>> >>>> I have captured a 30 minute pcap file captured with this command: >>>> tcpdump -i enp2s0 -G 1800 -w /tmp/enp2s0.%FT%T.pcap host edgemax and >>>> port 53 >>>> >>>> This file contains DNS traffic to/from edgemax only. >>>> I can count responses like this: >>>> tshark -t a -r enp2s0.2020-05-11T13:00:02.pcap | grep -c "Standard >>>> query response" >>>> 349 >>>> And queries like this: >>>> tshark -t a -r enp2s0.2020-05-11T13:00:02.pcap | grep -c "Standard >>>> query 0x" >>>> 349 >>>> >>>> In other words, no missing DNS responses in the 30 minutes spanning >>>> 13:00:02 to 13:29:51. >>>> >>>> I would think that the alert should "clear" because the threshold is >>>> not exceeded within that 30 minute pcap file. >>>> >>>> In any case, at 13:23, I manually click on the "Release" button for >>>> that alert. 2 minutes later, at 13:25:00, I receive this alert: >>>> Host edgemax has received 62 DNS requests but sent 0 DNS replies [5 >>>> Minutes ratio: 0%] >>>> >>>> As stated previously, no missing DNS responses in the 30 minutes >>>> spanning 13:00:02 to 13:29:51. Why does ntopng think 62 replies are >>>> missing? >>>> >>>> Please report your ntopng.conf. If you look at the active ntopng DNS >>>> flows, can you identify unidirectional flows? You can also try to run >>>> ntopng on the PCAP file (--original-speed -i file.pcap). If you can >>>> reproduce using the PCAP file, please send it to me privately so that I can >>>> troubleshoot the problem. >>>> >>>> >>>> I exported 10 minutes of PCAP from if_stats.lua. Using the filter >>>> "(ip.dst_host == "10.12.17.1" or ip.src_host == "10.12.17.1") and dns" I am >>>> not able to find any missing DNS responses in wireshark. Interestingly, If >>>> I specify a BPF Filter ("port 53"), the downloaded PCAP file seems to only >>>> have 1 side (ie. edgemax is only a source, never a dest. Without a BPF >>>> Filter, the download is fine. >>>> >>>> This is probably a bug, please open an issue at >>>> https://github.com/ntop/ntopng . >>>> >>>> Regards, >>>> >>>> Emanuele >>>> >>>> >>>> >>>> >>>> >>>> On Mon, May 11, 2020 at 8:59 AM Emanuele Faranda <fara...@ntop.org> >>>> wrote: >>>> >>>>> Hi Aaron, >>>>> >>>>> Please see below: >>>>> On 5/8/20 10:27 PM, Aaron Scamehorn wrote: >>>>> >>>>> Thank you for your response. In the screenshot below, can you please >>>>> explain the significance of the "Date/Time" and the "Duration" columns? >>>>> What do they mean in this context? >>>>> >>>>> Date/Time: the time when the alert was triggered. Ntopng performs >>>>> periodic checks in order to trigger alerts. In this particular case, the >>>>> check on the requests/reply ratio is performed every 5 minutes. So this >>>>> means that problem started between 07:20 and 07:25 . >>>>> >>>>> Duration: the total time in which the problem was active. Again, the >>>>> check is performed every 5 minutes for this alert so 5 minutes is the >>>>> granularity. >>>>> >>>>> >>>>> Do I understand correctly that all 3 hosts triggered the alert at >>>>> 07:25:01 (OR 07:30:01) this morning? And that all three alerts are active >>>>> for the past 07:28:53 hours? Does this mean that there have been no new >>>>> additional DNS Reply/Request issues have been detected? >>>>> >>>>> As explained above, the problem started between 07:20 and 07:25 . For >>>>> 07:28:53 hours the problem was active on all the three hosts (the >>>>> requests/reply ratio threshold was exceeded for 07:28:53 hours). >>>>> >>>>> >>>>> I notice in "Past Alerts" tab, that there are many Reply/Request >>>>> Alerts for the same host with very short durations (screen shot #2). >>>>> When/how does an alert move from the "Engaged" to "Past" tab? >>>>> >>>>> In this case, the engaged alert becomes "past" alert when, after the >>>>> check performed every 5 minutes, the requests/reply ratio threshold is not >>>>> exceed anymore. This can happen as soon as the next check is performed (5 >>>>> minutes). >>>>> >>>>> >>>>> So in the 2nd screenshot, fire-TV had an alert at 06:20:00 for 05:00 >>>>> minutes where 18 requests received 0 replies. Then another alert at >>>>> 06:50:00 for 05:00 minutes. Were the 18 replies from the first alert >>>>> ultimately received? And they were received 5 minutes the alert occurred? >>>>> >>>>> The check is performed on the DNS packet counters. A DNS request >>>>> cannot take 5 minutes to be replied. The fact that the alert was closed >>>>> after 5/10 minutes could be related to one of these events: >>>>> >>>>> - The host went idle >>>>> >>>>> - The host did not send enough DNS requests >>>>> >>>>> - The new DNS requests made by the host were successfully replied. >>>>> >>>>> >>>>> Context here is that 99% of the traffic is Internet traffic. Almost >>>>> all of the pihole traffic is to forwarders. BTW, the way pihole works (by >>>>> default) is it replies 0.0.0.0 for blocked hosts. It should respond to >>>>> every query. >>>>> >>>>> I tried the live_pcap_download.html >>>>> <https://www.ntop.org/guides/ntopng/advanced_features/live_pcap_download.html> >>>>> lua, but couldn't figure out the bpf_filter: >>>>> curl --cookie "user=admin; password=xxxxx" " >>>>> http://10.12.17.25:3000/lua/live_traffic.lua?ifid=0&duration=600&bpf_filter=\"port >>>>> 53\"" >>>>> >>>>> I also tried the download pcap on the if_stats.lua page. The >>>>> downloaded pcap file seems to only contain incoming data (see wireshark)? >>>>> >>>>> This is consistent with the above alerts, please ensure that ntopng is >>>>> not dropping packets as this would explain this behavior. >>>>> >>>>> >>>>> If I just do a tshark on the same interface that ntopng is listening >>>>> on, I see all of the expected DNS query & replies. I am not able to >>>>> correlate the alerts to any missing packets. >>>>> >>>>> See response above. >>>>> >>>>> Regards, >>>>> >>>>> Emanuele >>>>> >>>>> >>>>> >>>>> >>>>> On Fri, May 8, 2020 at 2:53 AM Emanuele Faranda <fara...@ntop.org> >>>>> wrote: >>>>> >>>>>> Hi Aaron, >>>>>> >>>>>> The alerts that you are reporting basically tell you that such hosts >>>>>> receive DNS requests but do not send a reply. In order to troubleshoot >>>>>> possible problems you should augment such information with the knowledge >>>>>> of >>>>>> your network. >>>>>> >>>>>> The first question to answer is, are that hosts expected to accept >>>>>> DNS requests? If not, are the requests generated from the internet or >>>>>> from >>>>>> the LAN? In the first case a firewall to block such DNS requests may be a >>>>>> good idea . In the latter case some hosts in the LAN may be >>>>>> misconfigured. >>>>>> In case of the pihole hosts, I expect pihole to block some DNS requests >>>>>> for >>>>>> advertisement sites so this could be a normal behaviour. The following >>>>>> ntopng features may also help you: >>>>>> >>>>>> >>>>>> https://www.ntop.org/guides/ntopng/advanced_features/live_pcap_download.html >>>>>> >>>>>> >>>>>> https://www.ntop.org/guides/ntopng/using_with_other_tools/n2disk.html >>>>>> >>>>>> https://www.ntop.org/guides/ntopng/historical_flows.html >>>>>> >>>>>> Regards, >>>>>> Emanuele >>>>>> On 5/7/20 5:57 PM, Aaron Scamehorn wrote: >>>>>> >>>>>> Hello, >>>>>> >>>>>> I'm trying to understand how/why I am getting the "Replies / Requests >>>>>> Ratio" warnings for DNS. >>>>>> >>>>>> I am suspect of these alerts, and would like to know how/why they are >>>>>> being generated. I am suspect for for the following reasons: 1) If it >>>>>> really is as bad as indicated, I should notice problems. 2) the "events' >>>>>> occur immediately after I clear the alerts, and tend to persist for >>>>>> hours. >>>>>> >>>>>> In any case, I cleared the alerts last night, and this is what they >>>>>> look like: >>>>>> >>>>>> 06/05/2020 22:15:00 12:31:28 Warning Replies / Requests Ratio Host >>>>>> edgemax.example.net >>>>>> <http://xps-630i.scamlan.net:3000/lua/host_details.lua?ifid=2&host=10.12.17.1@1&page=historical&epoch_begin=1588864588&epoch_end=1588868188> >>>>>> has received 54 DNS requests but sent 0 DNS replies [5 Minutes ratio: 0%] >>>>>> >>>>>> 06/05/2020 22:15:00 12:31:28 Warning Replies / Requests Ratio Host >>>>>> pihole.example.net >>>>>> <http://xps-630i.scamlan.net:3000/lua/host_details.lua?ifid=2&host=10.12.17.3@1&page=historical&epoch_begin=1588864588&epoch_end=1588868188> >>>>>> has sent 93 DNS requests but received 3 DNS replies [5 Minutes ratio: >>>>>> 3.2%] >>>>>> >>>>>> 06/05/2020 22:15:00 12:31:28 Warning Replies / Requests Ratio Host >>>>>> pihole-2.example.net >>>>>> <http://xps-630i.scamlan.net:3000/lua/host_details.lua?ifid=2&host=10.12.17.4@1&page=historical&epoch_begin=1588864588&epoch_end=1588868188> >>>>>> has sent 97 DNS requests but received 1 DNS reply [5 Minutes ratio: 1.0%] >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> _______________________________________________ >>>>>> Ntop mailing >>>>>> listNtop@listgateway.unipi.ithttp://listgateway.unipi.it/mailman/listinfo/ntop >>>>>> >>>>>> _______________________________________________ >>>>>> Ntop mailing list >>>>>> Ntop@listgateway.unipi.it >>>>>> http://listgateway.unipi.it/mailman/listinfo/ntop >>>>> >>>>> >>>>> _______________________________________________ >>>>> Ntop mailing >>>>> listNtop@listgateway.unipi.ithttp://listgateway.unipi.it/mailman/listinfo/ntop >>>>> >>>>> _______________________________________________ >>>>> Ntop mailing list >>>>> Ntop@listgateway.unipi.it >>>>> http://listgateway.unipi.it/mailman/listinfo/ntop >>>> >>>> >>>> _______________________________________________ >>>> Ntop mailing >>>> listNtop@listgateway.unipi.ithttp://listgateway.unipi.it/mailman/listinfo/ntop >>>> >>>> _______________________________________________ >>>> Ntop mailing list >>>> Ntop@listgateway.unipi.it >>>> http://listgateway.unipi.it/mailman/listinfo/ntop >>> >>> >>> _______________________________________________ >>> Ntop mailing >>> listNtop@listgateway.unipi.ithttp://listgateway.unipi.it/mailman/listinfo/ntop >>> >>> >>> _______________________________________________ >>> Ntop mailing >>> listNtop@listgateway.unipi.ithttp://listgateway.unipi.it/mailman/listinfo/ntop >>> >>> _______________________________________________ >>> Ntop mailing list >>> Ntop@listgateway.unipi.it >>> http://listgateway.unipi.it/mailman/listinfo/ntop >> >> >> _______________________________________________ >> Ntop mailing >> listNtop@listgateway.unipi.ithttp://listgateway.unipi.it/mailman/listinfo/ntop >> >> _______________________________________________ >> Ntop mailing list >> Ntop@listgateway.unipi.it >> http://listgateway.unipi.it/mailman/listinfo/ntop > > > _______________________________________________ > Ntop mailing > listNtop@listgateway.unipi.ithttp://listgateway.unipi.it/mailman/listinfo/ntop > > _______________________________________________ > Ntop mailing list > Ntop@listgateway.unipi.it > http://listgateway.unipi.it/mailman/listinfo/ntop
_______________________________________________ Ntop mailing list Ntop@listgateway.unipi.it http://listgateway.unipi.it/mailman/listinfo/ntop