2

We've recently upgraded to Ubuntu 16.04 (kernel 4.4) and I've noticed some new behavior regarding net.netfilter.nf_conntrack_max. In the past (with 12.04 running 3.2) if you hit nf_conntrack_max you wouldn't be able to establish any new connections. However, I've been doing some testing with SYN flooding and SYNPROXY DDoS protection. I've found that after hitting nf_conntrack_max by way of a SYN flood I can still establish connections to the server.

Using SYNPROXY keeps the conntrack table to established connections, but with or without it I can still connect to the server with no issues.

Does anyone have any info on this?

I came across lockless TCP listeners in 4.4:

https://kernelnewbies.org/Linux_4.4#head-7c34e3af145ac61502d1e032726946e9b380d03d

I'm wondering if this is part of it.

marcantonio
  • 141
  • 2

0 Answers0