LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 11-25-2004, 10:42 AM   #1
TrulyTessa
Member
 
Registered: Nov 2004
Location: Canada, eh
Distribution: SuSE 9.2 Pro
Posts: 63

Rep: Reputation: 15
Dropped connections


I have noticed that my internet connection is flakey. I first noticed this using OpenSSH to connect to my linux machine (running SuSE 9.2), but the problem is not unique to SSH, nor is it isolated to attempt to connect TO my machine (connections FROM my machine are also affected). It is rare for any SSH connection to last more than a few minutes, and sometimes a connection lasts a mere second. Suffice to say, this is not conducive to productivity!

I have checked to make sure TCPKeepAlive is set to 'no' in my sshd_config file, but I don't think this is an SSH-only issue.

According to YaST, my firewall is configured to allow HTTP and SSH services, but nothing else.

A colleague in the same building (on the same network) has no network issues. He can run SSH for days at a time with no interruptions. The only differences between our situations are that he is running an earlier version of SuSE, and his machine plugs straight into the wall, whereas mine sits on a simple hub to which two Windows machines are also connected. My machine has a static IP, as does his.

Does anyone have any suggestions on how I can properly diagnose and fix this problem?

Many thanks.
 
Old 11-25-2004, 12:40 PM   #2
david_ross
Moderator
 
Registered: Mar 2003
Location: Scotland
Distribution: Slackware, RedHat, Debian
Posts: 12,047

Rep: Reputation: 79
I doubt if it is the firewall rules but can you post the output from:
iptables -nL

It is possible that the hub or network card is malfunctioning, is there any chance that you can patch it in to another device?

Another useful test would be to connect your PC directly to another PC via a crossover cable and see if the problem persists - this could narrow down a hardware issue to one device.
 
Old 11-25-2004, 02:29 PM   #3
TrulyTessa
Member
 
Registered: Nov 2004
Location: Canada, eh
Distribution: SuSE 9.2 Pro
Posts: 63

Original Poster
Rep: Reputation: 15
My sense is that I don't seem have the connection problems when I boot to Windows, but I haven't done any tests to verify that sense.

Here is the output from iptables -nL:

Code:
 
Chain INPUT (policy DROP)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
ACCEPT     udp  --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED
input_ext  all  --  0.0.0.0/0            0.0.0.0/0
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-IN-ILL-TARGET '
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain FORWARD (policy DROP)
target     prot opt source               destination

Chain OUTPUT (policy DROP)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
LOG        icmp --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 icmp type 11 LOG flags 6 level 4 prefix `SFW2-OUT-TRACERT-ATTEMPT '
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 3 code 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 3 code 4
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 3 code 9
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 3 code 10
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 3 code 13
DROP       icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 3
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state NEW,RELATED,ESTABLISHED
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-OUT-ERROR '

Chain forward_dmz (0 references)
target     prot opt source               destination

Chain forward_ext (0 references)
target     prot opt source               destination

Chain forward_int (0 references)
target     prot opt source               destination

Chain input_dmz (0 references)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-DROP-BCASTd '
DROP       all  --  0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 4
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 12
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 14
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 18
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state INVALID LOG flags 6 level 4 prefix `SFW2-INdmz-DROP-DEFLT-INV '
DROP       all  --  0.0.0.0/0            0.0.0.0/0           state INVALID
LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:80 flags:0x16/0x02 LOG flags 6 level 4 prefix `SFW2-INdmz-ACC-TCP'
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INdmz-DROP-DEFLT '
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain input_ext (1 references)
target     prot opt source               destination
LOG        all  --  0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-DROP-BCASTe '
DROP       all  --  0.0.0.0/0            0.0.0.0/0           PKTTYPE = broadcast
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 4
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 12
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 14
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 18
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state INVALID LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT-INV '
DROP       all  --  0.0.0.0/0            0.0.0.0/0           state INVALID
LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:80 flags:0x16/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP'
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80
LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:22 flags:0x16/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP'
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:22
LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:80 flags:0x16/0x02 LOG flags 6 level 4 prefix `SFW2-INext-ACC-TCP'
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80
LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:113 state NEW limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-REJECT '
reject_func  tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:113 state NEW
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INext-DROP-DEFLT '
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain input_int (0 references)
target     prot opt source               destination
ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 4
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           icmp type 8
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED 
icmp type 0ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 3
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 11
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 12
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 14
ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0           state RELATED,ESTABLISHED icmp type 18
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 state INVALID LOG flags 6 level 4 prefix `SFW2-INint-DROP-DEFLT-INV '
DROP       all  --  0.0.0.0/0            0.0.0.0/0           state INVALID
LOG        tcp  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 tcp dpt:80 flags:0x16/0x02 LOG flags 6 level 4 prefix `SFW2-INint-ACC-TCP'
ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80
LOG        all  --  0.0.0.0/0            0.0.0.0/0           limit: avg 3/min burst 5 LOG flags 6 level 4 prefix `SFW2-INint-DROP-DEFLT '
DROP       all  --  0.0.0.0/0            0.0.0.0/0

Chain reject_func (1 references)
target     prot opt source               destination
REJECT     tcp  --  0.0.0.0/0            0.0.0.0/0           reject-with tcp-reset
REJECT     udp  --  0.0.0.0/0            0.0.0.0/0           reject-with icmp-port-unreachable
REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with icmp-proto-unreachable
 
Old 11-25-2004, 02:51 PM   #4
david_ross
Moderator
 
Registered: Mar 2003
Location: Scotland
Distribution: Slackware, RedHat, Debian
Posts: 12,047

Rep: Reputation: 79
I can't see anything obvious in those rules but like a lot of distro supplied firewalls they are very cryptic. If you are on a secure lan then you may want to try disabling it to see if it makes a difference:
iptables -P INPUT ACCEPT
iptables -P OUTPUT ACCEPT
iptables -P FORWARD ACCEPT
iptables -F
 
Old 11-25-2004, 03:01 PM   #5
TrulyTessa
Member
 
Registered: Nov 2004
Location: Canada, eh
Distribution: SuSE 9.2 Pro
Posts: 63

Original Poster
Rep: Reputation: 15
Quote:
Originally posted by david_ross
If you are on a secure lan then you may want to try disabling it to see if it makes a difference
Hmm, there's a thought. My machine does reside inside a protected network, and the network administrators opened up port 22 to allow me to use SSH.

If I disable the firewall on my machine (which I can do directly through YaST with SuSE), will my machine face any considerable risks? Temporarily disabling the firewall to determine if the problem rests with the firewall -- that doesn't concern me. But if disabling the firewall fixes the problem, would it be dangerous to leave it disabled permanently?

Many thanks.
 
Old 11-25-2004, 03:11 PM   #6
david_ross
Moderator
 
Registered: Mar 2003
Location: Scotland
Distribution: Slackware, RedHat, Debian
Posts: 12,047

Rep: Reputation: 79
If they are only allowing ssh into your machine then I wouldn't be too worried if you trust the other people on your LAN. Obviously you should continue to check that your ssh server is reasonably current and doesn't have any known exploits but that should be done regardless of whether you have a local firewall running or not.

If it does fix the problem then I wouldn't neccesarily not replace it. I would probably suggest using something simpler to manage though. Most of these firewalls seem fine when using a graphical tool to edit them but by the time you need to work out what is wrong they can be difficult to work with.
 
Old 11-26-2004, 09:53 AM   #7
TrulyTessa
Member
 
Registered: Nov 2004
Location: Canada, eh
Distribution: SuSE 9.2 Pro
Posts: 63

Original Poster
Rep: Reputation: 15
Well, opening up the firewall didn't fix the problem. I'm running a test to see if the connection if flakey when I boot into Windows instead of linux. If it's not, it will rule out a hardware problem.

Any other thoughts?
 
Old 11-26-2004, 01:28 PM   #8
david_ross
Moderator
 
Registered: Mar 2003
Location: Scotland
Distribution: Slackware, RedHat, Debian
Posts: 12,047

Rep: Reputation: 79
It could be a flakey network card driver. You could try updating your kernel if it isn't current.
 
Old 11-26-2004, 03:06 PM   #9
TrulyTessa
Member
 
Registered: Nov 2004
Location: Canada, eh
Distribution: SuSE 9.2 Pro
Posts: 63

Original Poster
Rep: Reputation: 15
I've confirmed there is no connection problem under Windows. I think my kernel is up-to-date, as I've only just installed 9.2.

However, I have just noticed the following error in my boot log, which may be related:

Error inserting hw_random (/lib/modules/2.6.8.24-default/kernel/drivers/char/hw_random.ko): No such device

Last edited by TrulyTessa; 11-26-2004 at 03:23 PM.
 
Old 11-26-2004, 03:24 PM   #10
TrulyTessa
Member
 
Registered: Nov 2004
Location: Canada, eh
Distribution: SuSE 9.2 Pro
Posts: 63

Original Poster
Rep: Reputation: 15
I just noticed that according to SuSE, the error I cited above isn't a 'real' error and can be safely ignored:

http://portal.suse.com/sdb/en/2004/0...hw_random.html

Out of ideas...
 
Old 11-27-2004, 09:05 AM   #11
david_ross
Moderator
 
Registered: Mar 2003
Location: Scotland
Distribution: Slackware, RedHat, Debian
Posts: 12,047

Rep: Reputation: 79
What kind of network card is it?
lspci | grep -i eth
 
Old 11-27-2004, 11:37 AM   #12
TrulyTessa
Member
 
Registered: Nov 2004
Location: Canada, eh
Distribution: SuSE 9.2 Pro
Posts: 63

Original Poster
Rep: Reputation: 15
It's a Broadcom adapter. SuSE 9.1 didn't have drivers for it (I tried everything, updating the kernel, you name it) so I had to install SuSE 9.2 to get a network connection.

The network card now works under 9.2, but sadly the connection is intermittent.

By the way, if it helps, the result of lspci is

0000:02:00.0 Ethernet controller: Broadcom Corporation NetXtreme BCM5751 Gigabit Ethernet PCI Express (rev 01)
 
Old 11-27-2004, 02:21 PM   #13
david_ross
Moderator
 
Registered: Mar 2003
Location: Scotland
Distribution: Slackware, RedHat, Debian
Posts: 12,047

Rep: Reputation: 79
Broadcom support is known to be far from brilliant on linux. The best proof I can show is a picture of finegan, the resident LQ hardware junkie, outside broadcom's head office:
http://clockwatching.net/~fin/images/fbc5-small.jpg

It may be worth checking what conditions the card is running under. Can you post the output from:
ethtool eth0
mii-tool -vv eth0
 
Old 11-27-2004, 05:07 PM   #14
TrulyTessa
Member
 
Registered: Nov 2004
Location: Canada, eh
Distribution: SuSE 9.2 Pro
Posts: 63

Original Poster
Rep: Reputation: 15
Hmmm, that's not promising. Funny picture though. I'd be glad to express my similar sentiment to the folks at Broadcom's HO!

The first command yielded the following:

Settings for eth0:
Supported ports: [ MII ]
Supported link modes: 10baseT/Half 10baseT/Full
100baseT/Half 100baseT/Full
1000baseT/Half 1000baseT/Full
Supports auto-negotiation: Yes
Advertised link modes: 10baseT/Half 10baseT/Full
100baseT/Half 100baseT/Full
1000baseT/Half 1000baseT/Full
Advertised auto-negotiation: Yes
Speed: 100Mb/s
Duplex: Full
Port: Twisted Pair
PHYAD: 1
Transceiver: internal
Auto-negotiation: on
Supports Wake-on: g
Wake-on: d
Current message level: 0x000000ff (255)
Link detected: yes

The second command wasn't reconized on my system. Any alternate way of getting SuSE linux to tell me what you seek to know?

Thanks for your patience David.
 
Old 11-28-2004, 12:49 PM   #15
david_ross
Moderator
 
Registered: Mar 2003
Location: Scotland
Distribution: Slackware, RedHat, Debian
Posts: 12,047

Rep: Reputation: 79
It may be worth changing the speed down to 10HD as opposed to 100FD. You can set it with:
ethtool -s eth0 speed 10 duplex half

This will need reset after each reboot but we can do that automatically if it helps the situation.

Quote:
Originally posted by TrulyTessa
The second command wasn't reconized on my system. Any alternate way of getting SuSE linux to tell me what you seek to know?
Both commands produce similar information, I just wasn't sure which or if both were installed on SuSE by default.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
too much dropped packets...Hi.. alaios Linux - Networking 2 02-10-2005 04:49 AM
Should gnome be dropped sh1ft Slackware 5 10-11-2004 03:35 PM
Forwarded Connections Dropped codedv Linux - Networking 0 08-28-2004 09:58 AM
dropped packets... sohmc Linux - Software 3 05-29-2003 09:26 AM
Slackware dropped!!! KevinJ Linux - Distributions 3 04-23-2001 01:59 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 01:05 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration