Re: Problem on SCTP
From: Sun Paul
Date: Tue Feb 21 2017 - 20:12:44 EST
Hi
the router is actually is a linux running on RHEL6.8
(2.6.32-642.4.2.el6.x86_64). it uses iptables to do SNAT aand DNAT
forward.
On Tue, Feb 21, 2017 at 11:53 PM, Xin Long <lucien.xin@xxxxxxxxx> wrote:
> On Tue, Feb 21, 2017 at 12:26 PM, Sun Paul <paulrbk@xxxxxxxxx> wrote:
>> Hi,
>>
>> sorry to get back late, the platform is running on KVM. and this
>> problem is resolved by moving to VMware environment, however, a new
>> problem is coming out, we noticed that the HB REQ is being ABORT from
>> client.
>>
>>
>> 03:32:35.233572 IP 10.165.250.22.3868 > 192.168.2.13.40001: sctp (1)
>> [HB REQ] (from server to sctp router)
>> 03:32:35.233603 IP 192.168.2.14.3868 > 192.168.2.13.40001: sctp (1)
>> [HB REQ] (from sctp router to client)
>> 03:32:35.233852 IP 192.168.2.13.40001 > 192.168.2.14.3868: sctp (1)
>> [ABORT] (from client to sctp router)
>>
>> 03:32:37.928679 IP 10.165.250.22.3868 > 192.168.2.13.40001: sctp (1) [HB REQ]
>> 03:32:37.928717 IP 192.168.2.14.3868 > 192.168.2.13.40001: sctp (1) [HB REQ]
>> 03:32:37.929247 IP 192.168.2.13.40001 > 192.168.2.14.3868: sctp (1) [ABORT]
>>
>> For the above packet flow, 10.165.250.22 is the server and
>> 192.168.2.13 is the client, the server 10.165.250.22 sends HB REQ to
>> client 192.168.2.13 through 192.168.2.14 (the SCTP router), and the
>> SCTP router change the src address before forward the HB REQ to the
>> client.
>>
>> But somehow the client is ABORT the HB REQ, any idea? is it related to
>> the HEARTBEAT information? or the checksum again>?
> The incorrect checksum won't cause ABORT, but the abnormal HB REQ
> could be, if HB information was modified when calculating the checksum
> on router, the ABORT may be caused in client process.
>
> is your SCTP router linux ? if yes, what's the kernel version ?
>
>>
>> On Fri, Jan 13, 2017 at 9:19 PM, Michael Tuexen
>> <Michael.Tuexen@xxxxxxxxxxxxxxxxx> wrote:
>>>> On 13 Jan 2017, at 10:43, Michael Tuexen <Michael.Tuexen@xxxxxxxxxxxxxxxxx> wrote:
>>>>
>>>> Your router does NOT change any field in the SCTP packet, but the
>>>> SCTP checksum was modified from
>>>> Checksum: 0xbaea49e5 (not verified)
>>>> to
>>>> Checksum: 0xa9a86d3f (not verified)
>>>> At least one of these is wrong. Read the tracefiles in wireshark and
>>>> enable checksum validation and wireshark will tell you which one is
>>>> correct. (That is why I asked for .pcap file instead of a .txt).
>>>>
>>>> My guess is that the initial checksum is correct and your box middlebox
>>>> not only changes the destination address and ttl field and header
>>>> checksum in the IP-header (which is expected) but also incorrectly the
>>>> SCTP checksum. Since no field in the SCTP packet has changed, the checksum
>>>> must be the same.
>>> At the server have a look at the SNMP counters:
>>> cat /proc/net/sctp/snmp
>>> You should find a line staring with
>>> SctpChecksumErrors
>>> If the number reported there is positive, the node received packets
>>> with checksum errors.
>>>
>>> Best regards
>>> Michael
>>>>
>>>> Best regards
>>>> Michael
>>>>> On 13 Jan 2017, at 04:29, Sun Paul <paulrbk@xxxxxxxxx> wrote:
>>>>>
>>>>> Frame 2: 98 bytes on wire (784 bits), 98 bytes captured (784 bits)
>>>>> Encapsulation type: Ethernet (1)
>>>>> Arrival Time: Jan 6, 2017 16:52:49.662321000 Malay Peninsula Standard Time
>>>>> [Time shift for this packet: 0.000000000 seconds]
>>>>> Epoch Time: 1483692769.662321000 seconds
>>>>> [Time delta from previous captured frame: 0.000179000 seconds]
>>>>> [Time delta from previous displayed frame: 0.000179000 seconds]
>>>>> [Time since reference or first frame: 0.000179000 seconds]
>>>>> Frame Number: 2
>>>>> Frame Length: 98 bytes (784 bits)
>>>>> Capture Length: 98 bytes (784 bits)
>>>>> [Frame is marked: False]
>>>>> [Frame is ignored: False]
>>>>> [Protocols in frame: eth:ethertype:ip:sctp]
>>>>> Ethernet II, Src: Vmware_81:41:6b (00:50:56:81:41:6b), Dst:
>>>>> Vmware_81:a6:a3 (00:50:56:81:a6:a3)
>>>>> Destination: Vmware_81:a6:a3 (00:50:56:81:a6:a3)
>>>>> Address: Vmware_81:a6:a3 (00:50:56:81:a6:a3)
>>>>> .... ..0. .... .... .... .... = LG bit: Globally unique
>>>>> address (factory default)
>>>>> .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
>>>>> Source: Vmware_81:41:6b (00:50:56:81:41:6b)
>>>>> Address: Vmware_81:41:6b (00:50:56:81:41:6b)
>>>>> .... ..0. .... .... .... .... = LG bit: Globally unique
>>>>> address (factory default)
>>>>> .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
>>>>> Type: IPv4 (0x0800)
>>>>> Internet Protocol Version 4, Src: 192.168.206.83, Dst: 192.168.206.66
>>>>> 0100 .... = Version: 4
>>>>> .... 0101 = Header Length: 20 bytes (5)
>>>>> Differentiated Services Field: 0x02 (DSCP: CS0, ECN: ECT(0))
>>>>> 0000 00.. = Differentiated Services Codepoint: Default (0)
>>>>> .... ..10 = Explicit Congestion Notification: ECN-Capable
>>>>> Transport codepoint '10' (2)
>>>>> Total Length: 84
>>>>> Identification: 0x0000 (0)
>>>>> Flags: 0x02 (Don't Fragment)
>>>>> 0... .... = Reserved bit: Not set
>>>>> .1.. .... = Don't fragment: Set
>>>>> ..0. .... = More fragments: Not set
>>>>> Fragment offset: 0
>>>>> Time to live: 63
>>>>> Protocol: SCTP (132)
>>>>> Header checksum: 0x1d3d [validation disabled]
>>>>> [Good: False]
>>>>> [Bad: False]
>>>>> Source: 192.168.206.83
>>>>> Destination: 192.168.206.66
>>>>> [Source GeoIP: Unknown]
>>>>> [Destination GeoIP: Unknown]
>>>>> Stream Control Transmission Protocol, Src Port: 50001 (50001), Dst
>>>>> Port: 3868 (3868)
>>>>> Source port: 50001
>>>>> Destination port: 3868
>>>>> Verification tag: 0x00000000
>>>>> [Assocation index: 0]
>>>>> Checksum: 0xa9a86d3f (not verified)
>>>>>
>>>>> INIT chunk (Outbound streams: 3000, inbound streams: 3000)
>>>>> Chunk type: INIT (1)
>>>>> 0... .... = Bit: Stop processing of the packet
>>>>> .0.. .... = Bit: Do not report
>>>>> Chunk flags: 0x00
>>>>> Chunk length: 52
>>>>> Initiate tag: 0xe79f40cb
>>>>> Advertised receiver window credit (a_rwnd): 62464
>>>>> Number of outbound streams: 3000
>>>>> Number of inbound streams: 3000
>>>>> Initial TSN: 176990880
>>>>> IPv4 address parameter (Address: 192.168.206.83)
>>>>> Parameter type: IPv4 address (0x0005)
>>>>> 0... .... .... .... = Bit: Stop processing of chunk
>>>>> .0.. .... .... .... = Bit: Do not report
>>>>> Parameter length: 8
>>>>> IP Version 4 address: 192.168.206.83
>>>>> IPv4 address parameter (Address: 192.168.1.83)
>>>>> Parameter type: IPv4 address (0x0005)
>>>>> 0... .... .... .... = Bit: Stop processing of chunk
>>>>> .0.. .... .... .... = Bit: Do not report
>>>>> Parameter length: 8
>>>>> IP Version 4 address: 192.168.1.83
>>>>> Supported address types parameter (Supported types: IPv6, IPv4)
>>>>> Parameter type: Supported address types (0x000c)
>>>>> 0... .... .... .... = Bit: Stop processing of chunk
>>>>> .0.. .... .... .... = Bit: Do not report
>>>>> Parameter length: 8
>>>>> Supported address type: IPv6 address (6)
>>>>> Supported address type: IPv4 address (5)
>>>>> ECN parameter
>>>>> Parameter type: ECN (0x8000)
>>>>> 1... .... .... .... = Bit: Skip parameter and continue
>>>>> processing of the chunk
>>>>> .0.. .... .... .... = Bit: Do not report
>>>>> Parameter length: 4
>>>>> Forward TSN supported parameter
>>>>> Parameter type: Forward TSN supported (0xc000)
>>>>> 1... .... .... .... = Bit: Skip parameter and continue
>>>>> processing of the chunk
>>>>> .1.. .... .... .... = Bit: Do report
>>>>> Parameter length: 4
>>>>
>>>> --
>>>> To unsubscribe from this list: send the line "unsubscribe linux-sctp" in
>>>> the body of a message to majordomo@xxxxxxxxxxxxxxx
>>>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>>
>> --
>> To unsubscribe from this list: send the line "unsubscribe linux-sctp" in
>> the body of a message to majordomo@xxxxxxxxxxxxxxx
>> More majordomo info at http://vger.kernel.org/majordomo-info.html