From: Sebastian Moeller <moeller0@gmx.de>
To: "Dave Täht" <dave.taht@gmail.com>
Cc: Mikael Abrahamsson <swmike@swm.pp.se>,
cerowrt-devel <cerowrt-devel@lists.bufferbloat.net>,
bloat <bloat@lists.bufferbloat.net>
Subject: Re: [Bloat] [Cerowrt-devel] talking at linux plumbers in portugal next week
Date: Tue, 3 Sep 2019 17:22:39 +0200 [thread overview]
Message-ID: <81C16404-35EA-4686-A18B-C533A6A02546@gmx.de> (raw)
In-Reply-To: <CAA93jw6VxZ4V85qYHWzb1UsLUX6acUu=1oXT6fWVpqnzAWgQUw@mail.gmail.com>
Not sure this is on-topic, but:
https://www.prnewswire.com/news-releases/root-cause-analysis-and-incident-report-on-the-august-ddos-attack-300905405.html
https://lists.gt.net/nanog/users/206044
> On Sep 3, 2019, at 16:21, Dave Taht <dave.taht@gmail.com> wrote:
>
> On Tue, Sep 3, 2019 at 5:23 AM Mikael Abrahamsson <swmike@swm.pp.se> wrote:
>>
>> On Mon, 2 Sep 2019, Dave Taht wrote:
>>
>>> with copy-pasted parameters set in the 90s - openwrt's default, last I
>>> looked, was 25/sec.
>>
>> -A syn_flood -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m limit --limit 25/sec --limit-burst 50 -m comment --comment "!fw3" -j RETURN
>> -A syn_flood -m comment --comment "!fw3" -j DROP
>>
>> Well, it's got a burst-size of 50. I agree that this is quite
>> conservative.
>>
>> However, at least in my home we're not seeing drops:
>>
>> # iptables -nvL | grep -A 4 "Chain syn_flood"
>> Chain syn_flood (1 references)
>> pkts bytes target prot opt in out source destination
>> 2296 113K RETURN tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 25/sec burst 50 /* !fw3 */
>> 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 /* !fw3 */
>>
>> But you might be right that in places with a lot more clients then this
>> might indeed cause problems.
>
> Well, *I* long ago had upped those params by 10x and don't see syn
> drops either on my backbone. But I rather suspect the rest of the
> world just copy-pasted it. It should scale as a function of bandwidth,
> I suppose, or get updated as a side effect of setting QoS - or just
> get bumped up. Start a bug over with openwrt? Take a hard look at
> other firewall designs?
>
> Like I said, though, my big question was is there a browser stat or
> some other easily accessible stat to see how
> often syns are rejected? Another context for this was syn negotiation
> with ecn on and the fallback.
>
> Interestingly, I've also seen a pretty big uptick in ecn marking over
> the last year or so, on one uplink (we do have a lot of guests that
> run apple gear), it's now at over 10% of of the drop ratio on
> outbound.
>
> This box is - I hope - the last cerowrt box running in the universe -
> and the only reason it ever goes down is because of a long duration
> power failure. I've been meaning to replace it for ages...
>
> root@lounge:~# uptime
> 07:14:53 up 55 days, 17:14, load average: 0.16, 0.09, 0.10
>
> outbound:
>
> qdisc fq_codel 120: parent 1:12 limit 1001p flows 1024 quantum 300
> target 5.0ms interval 100.0ms ecn
> Sent 159378714029 bytes 1038654784 pkt (dropped 426065, overlimits 0
> requeues 0)
> backlog 0b 0p requeues 0
> maxpacket 1514 drop_overlimit 0 new_flow_count 213282954 ecn_mark 48220
> new_flows_len 0 old_flows_len 1
>
> inbound: (where comcast remarks most packets to CS1)
>
> qdisc fq_codel 120: parent 1:12 limit 1001p flows 1024 quantum 1500
> target 5.0ms interval 100.0ms ecn
> Sent 40391986695 bytes 34710741 pkt (dropped 420, overlimits 0 requeues 0)
> backlog 0b 0p requeues 0
> maxpacket 1514 drop_overlimit 0 new_flow_count 5687382 ecn_mark 0
> new_flows_len 0 old_flows_len 2
> qdisc fq_codel 130: parent 1:13 limit 1001p flows 1024 quantum 300
> target 5.0ms interval 100.0ms ecn
> Sent 2285974845172 bytes 1748071724 pkt (dropped 61231, overlimits 0
> requeues 0)
> backlog 0b 0p requeues 0
> maxpacket 1514 drop_overlimit 0 new_flow_count 229072930 ecn_mark 344
> new_flows_len 0 old_flows_len 1
>
>
>>
>> --
>> Mikael Abrahamsson email: swmike@swm.pp.se
>
>
>
> --
>
> Dave Täht
> CTO, TekLibre, LLC
> http://www.teklibre.com
> Tel: 1-831-205-9740
> _______________________________________________
> Cerowrt-devel mailing list
> Cerowrt-devel@lists.bufferbloat.net
> https://lists.bufferbloat.net/listinfo/cerowrt-devel
prev parent reply other threads:[~2019-09-03 15:22 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-09-03 0:47 [Bloat] " Dave Taht
2019-09-03 12:23 ` Mikael Abrahamsson
2019-09-03 14:21 ` Dave Taht
2019-09-03 14:35 ` [Bloat] Revising the synflood limit Dave Taht
2019-09-10 18:08 ` [Bloat] [Cerowrt-devel] " Maciej Sołtysiak
2019-09-10 22:35 ` Dave Taht
2019-09-23 9:37 ` Maciej Sołtysiak
2019-09-03 14:45 ` [Bloat] talking at linux plumbers in portugal next week Toke Høiland-Jørgensen
2019-09-03 14:47 ` Dave Taht
2019-09-03 15:10 ` Toke Høiland-Jørgensen
2019-09-03 15:21 ` Dave Taht
2019-09-03 15:22 ` Sebastian Moeller [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://lists.bufferbloat.net/postorius/lists/bloat.lists.bufferbloat.net/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=81C16404-35EA-4686-A18B-C533A6A02546@gmx.de \
--to=moeller0@gmx.de \
--cc=bloat@lists.bufferbloat.net \
--cc=cerowrt-devel@lists.bufferbloat.net \
--cc=dave.taht@gmail.com \
--cc=swmike@swm.pp.se \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox