TCP Resets

From: justin phelps <justin#pana.ma>
Date: Thu, 28 Apr 2011 14:16:27 -0700


I've just inherited an HAP network.
On all of the servers that are load balanced I'm seeing a ton of RSTs from HAP. Everything appears to be working just fine, but it seems abnormal to me that HAP would terminate every session via RST instead of FIN. I've tried unsetting abortonclose in case that was an issue, but it didn't change the behavior. Is this normal behavior? If not, what configuration might be causing it? Running 1.4.9 on Linux 2.6.18-194.26.1.el5

13:54:31.982928 IP 192.168.89.1.43879 > 192.168.89.101.8081: Flags [SEW], seq 752073369, win 5840, options [mss 1460,sackOK,TS val 1277671015 ecr 0,nop,wscale 9], length 0
13:54:31.982933 IP 192.168.89.101.8081 > 192.168.89.1.43879: Flags [S.E], seq 1212561515, ack 752073370, win 5792, options [mss 1460,sackOK,TS val 576920935 ecr 1277671015,nop,wscale 9], length 0
13:54:31.983014 IP 192.168.89.1.43879 > 192.168.89.101.8081: Flags [P.], seq 1:398, ack 1, win 12, options [nop,nop,TS val 1277671015 ecr 576920935], length 397
13:54:31.983030 IP 192.168.89.101.8081 > 192.168.89.1.43879: Flags [.], ack 398, win 14, options [nop,nop,TS val 576920935 ecr 1277671015], length 0
13:54:32.071926 IP 192.168.89.1.43879 > 192.168.89.101.8081: Flags [P.], seq 398:540, ack 1, win 12, options [nop,nop,TS val 1277671104 ecr 576920935], length 142
13:54:32.071938 IP 192.168.89.101.8081 > 192.168.89.1.43879: Flags [.], ack 540, win 16, options [nop,nop,TS val 576921024 ecr 1277671104], length 0
13:54:32.106764 IP 192.168.89.101.8081 > 192.168.89.1.43879: Flags [P.], seq 1:179, ack 540, win 16, options [nop,nop,TS val 576921059 ecr 1277671104], length 178
13:54:32.107335 IP 192.168.89.101.8081 > 192.168.89.1.43879: Flags [P.], seq 179:873, ack 540, win 16, options [nop,nop,TS val 576921059 ecr 1277671104], length 694
13:54:32.107394 IP 192.168.89.1.43879 > 192.168.89.101.8081: Flags [.], ack 873, win 17, options [nop,nop,TS val 1277671140 ecr 576921059], length 0
13:54:32.107445 IP 192.168.89.1.43879 > 192.168.89.101.8081: Flags [R.], seq 540, ack 873, win 17, options [nop,nop,TS val 1277671140 ecr 576921059], length 0
13:54:32.790782 IP 192.168.89.1.43893 > 192.168.89.101.8081: Flags [SEW], seq 753776693, win 5840, options [mss 1460,sackOK,TS val 1277671823 ecr 0,nop,wscale 9], length 0
13:54:32.790794 IP 192.168.89.101.8081 > 192.168.89.1.43893: Flags [S.E], seq 1206986920, ack 753776694, win 5792, options [mss 1460,sackOK,TS val 576921743 ecr 1277671823,nop,wscale 9], length 0
13:54:32.790902 IP 192.168.89.1.43893 > 192.168.89.101.8081: Flags [P.], seq 1:46, ack 1, win 12, options [nop,nop,TS val 1277671823 ecr 576921743], length 45
13:54:32.790920 IP 192.168.89.101.8081 > 192.168.89.1.43893: Flags [.], ack 46, win 12, options [nop,nop,TS val 576921743 ecr 1277671823], length 0
13:54:32.794990 IP 192.168.89.101.8081 > 192.168.89.1.43893: Flags [P.], seq 1:99, ack 46, win 12, options [nop,nop,TS val 576921747 ecr 1277671823], length 98
13:54:32.795041 IP 192.168.89.1.43893 > 192.168.89.101.8081: Flags [F.], seq 46, ack 99, win 12, options [nop,nop,TS val 1277671827 ecr 576921747], length 0
13:54:32.795430 IP 192.168.89.101.8081 > 192.168.89.1.43893: Flags [F.], seq 99, ack 47, win 12, options [nop,nop,TS val 576921747 ecr 1277671827], length 0
13:54:32.795470 IP 192.168.89.1.43893 > 192.168.89.101.8081: Flags [.], ack 100, win 12, options [nop,nop,TS val 1277671828 ecr 576921747], length 0
13:54:34.743379 IP 192.168.89.1.43939 > 192.168.89.101.8081: Flags [SEW], seq 754994446, win 5840, options [mss 1460,sackOK,TS val 1277673776 ecr 0,nop,wscale 9], length 0
13:54:34.743392 IP 192.168.89.101.8081 > 192.168.89.1.43939: Flags [S.E], seq 1204096320, ack 754994447, win 5792, options [mss 1460,sackOK,TS val 576923695 ecr 1277673776,nop,wscale 9], length 0
13:54:34.743474 IP 192.168.89.1.43939 > 192.168.89.101.8081: Flags [P.], seq 1:458, ack 1, win 12, options [nop,nop,TS val 1277673776 ecr 576923695], length 457
13:54:34.743487 IP 192.168.89.101.8081 > 192.168.89.1.43939: Flags [.], ack 458, win 14, options [nop,nop,TS val 576923695 ecr 1277673776], length 0
13:54:34.744976 IP 192.168.89.1.43939 > 192.168.89.101.8081: Flags [P.], seq 458:460, ack 1, win 12, options [nop,nop,TS val 1277673778 ecr 576923695], length 2
13:54:34.744982 IP 192.168.89.101.8081 > 192.168.89.1.43939: Flags [.], ack 460, win 14, options [nop,nop,TS val 576923697 ecr 1277673778], length 0
13:54:34.755595 IP 192.168.89.101.8081 > 192.168.89.1.43939: Flags [P.], seq 1:179, ack 460, win 14, options [nop,nop,TS val 576923707 ecr 1277673778], length 178
13:54:34.756079 IP 192.168.89.101.8081 > 192.168.89.1.43939: Flags [P.], seq 179:218, ack 460, win 14, options [nop,nop,TS val 576923708 ecr 1277673778], length 39
13:54:34.756125 IP 192.168.89.1.43939 > 192.168.89.101.8081: Flags [.], ack 218, win 14, options [nop,nop,TS val 1277673789 ecr 576923707], length 0
13:54:34.756135 IP 192.168.89.1.43939 > 192.168.89.101.8081: Flags [R.], seq 460, ack 218, win 14, options [nop,nop,TS val 1277673789 ecr 576923707], length 0
13:54:34.794778 IP 192.168.89.1.43942 > 192.168.89.101.8081: Flags [SEW], seq 767399002, win 5840, options [mss 1460,sackOK,TS val 1277673828 ecr 0,nop,wscale 9], length 0
13:54:34.794790 IP 192.168.89.101.8081 > 192.168.89.1.43942: Flags [S.E], seq 1218273082, ack 767399003, win 5792, options [mss 1460,sackOK,TS val 576923747 ecr 1277673828,nop,wscale 9], length 0
13:54:34.794839 IP 192.168.89.1.43942 > 192.168.89.101.8081: Flags [P.], seq 1:46, ack 1, win 12, options [nop,nop,TS val 1277673828 ecr 576923747], length 45
13:54:34.794852 IP 192.168.89.101.8081 > 192.168.89.1.43942: Flags [.], ack 46, win 12, options [nop,nop,TS val 576923747 ecr 1277673828], length 0
13:54:34.796842 IP 192.168.89.101.8081 > 192.168.89.1.43942: Flags [P.], seq 1:99, ack 46, win 12, options [nop,nop,TS val 576923749 ecr 1277673828], length 98
13:54:34.796923 IP 192.168.89.1.43942 > 192.168.89.101.8081: Flags [F.], seq 46, ack 99, win 12, options [nop,nop,TS val 1277673830 ecr 576923749], length 0
13:54:34.797230 IP 192.168.89.101.8081 > 192.168.89.1.43942: Flags [F.], seq 99, ack 47, win 12, options [nop,nop,TS val 576923749 ecr 1277673830], length 0
13:54:34.797271 IP 192.168.89.1.43942 > 192.168.89.101.8081: Flags [.], ack 100, win 12, options [nop,nop,TS val 1277673830 ecr 576923749], length 0
13:54:36.797333 IP 192.168.89.1.43985 > 192.168.89.101.8081: Flags [SEW], seq 768676412, win 5840, options [mss 1460,sackOK,TS val 1277675831 ecr 0,nop,wscale 9], length 0
13:54:36.797346 IP 192.168.89.101.8081 > 192.168.89.1.43985: Flags [S.E], seq 1212354744, ack 768676413, win 5792, options [mss 1460,sackOK,TS val 576925749 ecr 1277675831,nop,wscale 9], length 0
13:54:36.797417 IP 192.168.89.1.43985 > 192.168.89.101.8081: Flags [P.], seq 1:46, ack 1, win 12, options [nop,nop,TS val 1277675831 ecr 576925749], length 45
13:54:36.797431 IP 192.168.89.101.8081 > 192.168.89.1.43985: Flags [.], ack 46, win 12, options [nop,nop,TS val 576925749 ecr 1277675831], length 0
13:54:36.799957 IP 192.168.89.101.8081 > 192.168.89.1.43985: Flags [P.], seq 1:99, ack 46, win 12, options [nop,nop,TS val 576925752 ecr 1277675831], length 98
Received on 2011/04/28 23:16

This archive was generated by hypermail 2.2.0 : 2011/04/28 23:30 CEST