On 08/13/2018 12:55 AM, Vieri Di Paola via Shorewall-users wrote:
>  
> On Saturday, August 11, 2018, 8:07:36 PM GMT+2, Tom Eastep 
> <teas...@shorewall.net> wrote: 
> 
>> My suggestion for debugging this further is to use a packet sniffer to
>> see what is happening on the wire during the period of loss:
>>
>> a) Are the echo-request packets being sent?
>> b) If not, is there unsuccessful ARPing occurring?
> 
> The echo requests are being sent as seen below. 
> 
> # tcpdump -i enp9s6 host 8.8.8.8
> dropped privs to tcpdump
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on enp9s6, link-type EN10MB (Ethernet), capture size 262144 bytes
> 08:12:18.603636 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 1, length 64
> 08:12:19.642887 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 2, length 64
> 08:12:20.682810 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 3, length 64
> 08:12:21.721237 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 4, length 64
> 08:12:22.762528 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 5, length 64
> 08:12:23.802597 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 6, length 64
> 08:12:24.841126 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 7, length 64
> 08:12:25.881195 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 8, length 64
> 08:12:26.922607 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 9, length 64
> 08:12:27.962655 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 10, length 64
> 08:12:29.001091 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 11, length 64
> 08:12:30.042569 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 12, length 64
> 08:12:31.082581 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 13, length 64
> 08:12:32.122591 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 14, length 64
> 08:12:33.162544 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 15, length 64
> 08:12:33.177647 IP google-public-dns-a.google.com > 192.168.101.2: ICMP echo 
> reply, id 4825, seq 15, length 64
> 08:12:34.171027 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 16, length 64
> 08:12:34.186632 IP google-public-dns-a.google.com > 192.168.101.2: ICMP echo 
> reply, id 4825, seq 16, length 64
> 08:12:35.180972 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 17, length 64
> 08:12:35.196782 IP google-public-dns-a.google.com > 192.168.101.2: ICMP echo 
> reply, id 4825, seq 17, length 64
> 08:12:36.191086 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 18, length 64
> 08:12:36.206656 IP google-public-dns-a.google.com > 192.168.101.2: ICMP echo 
> reply, id 4825, seq 18, length 64
> 08:12:37.201017 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 19, length 64
> 08:12:37.216632 IP google-public-dns-a.google.com > 192.168.101.2: ICMP echo 
> reply, id 4825, seq 19, length 64
> 08:12:38.210990 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 20, length 64
> 08:12:38.226712 IP google-public-dns-a.google.com > 192.168.101.2: ICMP echo 
> reply, id 4825, seq 20, length 64
> 08:12:39.219069 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 21, length 64
> 08:12:39.234713 IP google-public-dns-a.google.com > 192.168.101.2: ICMP echo 
> reply, id 4825, seq 21, length 64
> 08:12:40.229018 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 22, length 64
> 08:12:40.244660 IP google-public-dns-a.google.com > 192.168.101.2: ICMP echo 
> reply, id 4825, seq 22, length 64
> 08:12:41.230962 IP 192.168.101.2 > google-public-dns-a.google.com: ICMP echo 
> request, id 4825, seq 23, length 64
> 08:12:41.246677 IP google-public-dns-a.google.com > 192.168.101.2: ICMP echo 
> reply, id 4825, seq 23, length 64
> 
> The pattern of echo replies failing to arrive is variable. At times, there's 
> no packet loss, but I frequently get a 10-20-40% packet loss (sometimes even 
> as high as 65%).
> I also noticed (but it's just an impression) that right after rebooting the 
> modem/router I get no packet loss whatsoever for several hours.
> 
> The shorewall gateway's enp9s6 interface is 100Mbps full duplex, and is 
> connected to the modem/router which has a built-in 4-port Gbps switch with an 
> ethernet cable. If I connect a test laptop to that mini switch while I'm 
> experiencing the packet loss issues on the shorewall box, I can see the same 
> problems there too. Disconnecting the shorewall gateway ethernet cable from 
> that 4-port switch, hence making my test laptopĀ  the only client device in 
> the network makes the packet loss issue vanish. Reconnecting the Shorewall 
> gateway restores the network issues. Again, I'd like to point out that 
> rebooting the modem/router solves everything for SEVERAL hours (basically 
> until the next day), no matter what I connect to that 4-port switch.
> 
> I'm wondering if there's a host within Shorewall's LAN that's generating some 
> sort of traffic that could be directly or indirectly causing this issue 
> (maybe it does so only on a daily basis and only at night, which would 
> explain why rebooting the modem/router in the morning fixes my issue for 
> about 24 hours).
> 
> A full tcpdump was taken on enp9s6 (no filters) while I was pinging 8.8.8.8 
> (and noticed missing reply packets even though there were requests). It can 
> be found here:
> 
> https://drive.google.com/open?id=1TVqiNmlaL4Hu5-I3IDiJpX66vPofHpd9
> 
> I'd appreciate it if you could let me know if you see anything odd in that 
> trace.
> 

The only thing that I see is heavy upload traffic to port 80 at IP
address 31.216.144.11.

There are no ARP packets in the entire pcap file, so it isn't a problem
of the upstream router not being able to determine the L2 address of
your gateway. Given that the echo-request packets are being sent, that
is about the only thing that your gateway could be involved in that
would result in dropped incoming echo-reply packets.

There are also some retransmissions of TCP packets going on, but that
isn't all that unusual.

I think that the next step I would take would be to pick a destination
"closer" to your gateway; use 'traceroute' to determine the IP address
of the router that is a couple of hops from your gateway and ping that.
If you don't see packet loss in those pings, then the problem is likely
beyond that router.

-Tom
-- 
Tom Eastep        \   Q: What do you get when you cross a mobster with
Shoreline,         \     an international standard?
Washington, USA     \ A: Someone who makes you an offer you can't
http://shorewall.org \   understand
                      \_______________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to