Bug 204199

Summary: Unable to download via a hardware firewall/router
Product: [Fedora] Fedora Reporter: Jim Gifford <giffordj>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Brian Brock <bbrock>
Severity: medium Docs Contact:
Priority: medium    
Version: 5CC: jonstanley, wtogami
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: MassClosed
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-01-20 04:39:46 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jim Gifford 2006-08-26 17:51:13 UTC
Description of problem:
Unable to download via a hardware firewall/router from a website.

Version-Release number of selected component (if applicable):
Fedora Core 5 - 2.6.17-1.2174
Network Adapter is a Prism54 based 802.11g
Selinux disabled

How reproducible:
With a Linksys VPN RV016 firewall enabled and Fedora Core 5 client, fails every
time. Case also opened with Linksys, but works fine with other linux distros.

Steps to Reproduce:
Give this a try. Save this in a file called post-doc
<?xml version='1.0' encoding='utf-8'?>
<SOAP-ENV:Envelope
xmlns:SOAP-ENV='http://schemas.xmlsoap.org/soap/envelope/'
xmlns:xsd='http://www.w3.org/2001/XMLSchema'
xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance'
xmlns:SOAP-ENC='http://schemas.xmlsoap.org/soap/encoding/'>
<SOAP-ENV:Body>
<ns1:download xmlns:ns1='urn:TMSWebServices'>
<startTime xsi:type='xsd:dateTime'>
2006-08-01T10:00:00Z
</startTime>
<endTime xsi:type='xsd:dateTime'>
2006-08-10T10:00:00Z
</endTime>
</ns1:download>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>

(Dates and times don't seem to matter for this test.)
Then try this command, substituting for YOURUSER and YOURPASSWD,
of course:

wget --http-user='YOURUSER' --http-passwd='YOURPASSWD' \
--post-file='post-doc' --header='Accept-Encoding:gzip' \
http://datadirect.webservices.zap2it...gs/xtvdService \
--output-document=- | gunzip >test
  
Actual results:
Capture for Fedora Core 5 at 192.168.1.160
Fri Aug 25 10:47:55 2006; ******** IP traffic monitor started ********
Fri Aug 25 10:47:58 2006; TCP; eth0; 60 bytes; from 192.168.1.160:54209 to
206.18.98.160:80; first packet (SYN)
Fri Aug 25 10:47:58 2006; TCP; eth0; 60 bytes; from 206.18.98.160:80 to
192.168.1.160:54209; first packet (SYN)
Fri Aug 25 10:47:58 2006; TCP; eth0; 52 bytes; from 192.168.1.160:54209 to
206.18.98.160:80; Connection reset; 6 packets, 1237 bytes, avg flow rate 9.00
kbits/s; opposite direction 3 packets, 579 bytes; avg flow rate 9.00 kbits/s
Fri Aug 25 10:47:58 2006; TCP; eth0; 60 bytes; from 192.168.1.160:54210 to
206.18.98.160:80; first packet (SYN)
Fri Aug 25 10:47:58 2006; TCP; eth0; 40 bytes; from 192.168.1.160:54209 to
206.18.98.160:80; Connection reset; 1 packets, 40 bytes, avg flow rate 0.00
kbits/s; opposite direction 0 packets, 0 bytes; avg flow rate 0.00 kbits/s
Fri Aug 25 10:47:58 2006; TCP; eth0; 60 bytes; from 206.18.98.160:80 to
192.168.1.160:54210; first packet (SYN)
Fri Aug 25 10:48:05 2006; ******** IP traffic monitor stopped ********

Expected results:
Capture for Fedora Core 5 at 192.168.1.160
Fri Aug 25 14:04:31 2006; ******** IP traffic monitor started ********
Fri Aug 25 14:04:39 2006; TCP; eth0; 60 bytes; from 192.168.1.160:54853 to
206.18.98.160:80; first packet (SYN)
Fri Aug 25 14:04:39 2006; TCP; eth0; 60 bytes; from 206.18.98.160:80 to
192.168.1.160:54853; first packet (SYN)
Fri Aug 25 14:04:39 2006; TCP; eth0; 52 bytes; from 192.168.1.160:54853 to
206.18.98.160:80; Connection reset; 6 packets, 1237 bytes, avg flow rate 9.00
kbits/s; opposite direction 3 packets, 579 bytes; avg flow rate 9.00 kbits/s
Fri Aug 25 14:04:39 2006; TCP; eth0; 60 bytes; from 192.168.1.160:54854 to
206.18.98.160:80; first packet (SYN)
Fri Aug 25 14:04:40 2006; TCP; eth0; 60 bytes; from 206.18.98.160:80 to
192.168.1.160:54854; first packet (SYN)
Fri Aug 25 14:04:40 2006; TCP; eth0; 40 bytes; from 192.168.1.160:54853 to
206.18.98.160:80; Connection reset; 1 packets, 40 bytes, avg flow rate 0.00
kbits/s; opposite direction 0 packets, 0 bytes; avg flow rate 0.00 kbits/s
Fri Aug 25 14:06:04 2006; TCP; eth0; 580 bytes; from 206.18.98.160:80 to
192.168.1.160:54854; FIN sent; 1262 packets, 1762449 bytes, avg flow rate 165.87
kbits/s
Fri Aug 25 14:06:04 2006; TCP; eth0; 52 bytes; from 192.168.1.160:54854 to
206.18.98.160:80; FIN acknowleged
Fri Aug 25 14:06:04 2006; TCP; eth0; 52 bytes; from 192.168.1.160:54854 to
206.18.98.160:80; FIN sent; 1158 packets, 61354 bytes, avg flow rate 5.76 kbits/s
Fri Aug 25 14:06:04 2006; TCP; eth0; 52 bytes; from 206.18.98.160:80 to
192.168.1.160:54854; FIN acknowleged
Fri Aug 25 14:06:54 2006; ******** IP traffic monitor stopped ********

Additional info:
TAC Case open with Linksys
http://www.linksysinfo.org/portal/forums/showthread.php?t=48185
http://www.gossamer-threads.com/lists/mythtv/users/219553
http://www.linksys.com/servlet/Satellite?c=L_Product_C2&childpagename=US%2FLayout&cid=1123638171453&pagename=Linksys%2FCommon%2FVisitorWrapper

Comment 1 Jim Gifford 2006-08-26 23:26:28 UTC
Just tested with a wired card, the same issue. The card was a via-rhine based cared.

Comment 2 David Lawrence 2006-09-05 15:58:20 UTC
Changing to proper owner, kernel-maint.

Comment 3 Dave Jones 2006-10-16 21:17:22 UTC
A new kernel update has been released (Version: 2.6.18-1.2200.fc5)
based upon a new upstream kernel release.

Please retest against this new kernel, as a large number of patches
go into each upstream release, possibly including changes that
may address this problem.

This bug has been placed in NEEDINFO state.
Due to the large volume of inactive bugs in bugzilla, if this bug is
still in this state in two weeks time, it will be closed.

Should this bug still be relevant after this period, the reporter
can reopen the bug at any time. Any other users on the Cc: list
of this bug can request that the bug be reopened by adding a
comment to the bug.

In the last few updates, some users upgrading from FC4->FC5
have reported that installing a kernel update has left their
systems unbootable. If you have been affected by this problem
please check you only have one version of device-mapper & lvm2
installed.  See bug 207474 for further details.

If this bug is a problem preventing you from installing the
release this version is filed against, please see bug 169613.

If this bug has been fixed, but you are now experiencing a different
problem, please file a separate bug for the new problem.

Thank you.

Comment 4 Jon Stanley 2008-01-20 04:39:46 UTC
(this is a mass-close to kernel bugs in NEEDINFO state)

As indicated previously there has been no update on the progress of this bug
therefore I am closing it as INSUFFICIENT_DATA. Please re-open if the issue
still occurs for you and I will try to assist in its resolution. Thank you for
taking the time to report the initial bug.

If you believe that this bug was closed in error, please feel free to reopen
this bug.