Bug 493226
| Summary: | net.ipv4.netfilter.ip_conntrack_tcp_be_liberal = 1 gets set to 0 (despite persistent setting in /etc/syctl.conf and runtime configuration) on iptables restart | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 5 | Reporter: | Christian Unger <chakkerz> |
| Component: | iptables | Assignee: | iptables-maint-list <iptables-maint-list> |
| Status: | CLOSED DUPLICATE | QA Contact: | qe-baseos-daemons |
| Severity: | high | Docs Contact: | |
| Priority: | low | ||
| Version: | 5.3 | CC: | cg2v, martin_foster, mikelococo, twoerner |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-11-14 16:14:59 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Christian Unger
2009-04-01 00:29:39 UTC
I confirm this bug, exactly as described. It's quite annoying. Version details follow, this should a fairly up-to-date system: $ cat /etc/redhat-release Red Hat Enterprise Linux Server release 5.4 (Tikanga) $ uname -a Linux tss-sysmon-v.sas.its.nyu.edu 2.6.18-128.4.1.el5 #1 SMP Thu Jul 23\ 19:59:17 EDT 2009 i686 i686 i386 GNU/Linux $ rpm -q iptables iptables-1.3.5-5.3.el5_4.1 To more succinctly summarize the workaround described above, adding the following to rc.local will set the correct setting after a reboot: sysctl -w net.ipv4.netfilter.ip_conntrack_tcp_be_liberal=1 However, it will still be overwritten when iptables is manually restarted unless you also edit /etc/sysconfig/iptables-config to contain: IPTABLES_MODULES_UNLOAD="no" If you apply both workarounds listed above, your settings should persist, though. Hello again It appears that the liberal setting is becoming more important again. I'm not sure why that is so, but i'm getting a lot of reports of issues with hosts that have a lot of traffic going through them. I have come up with a work around: modify /etc/modprobe.conf as follows: install ip_conntrack /sbin/modprobe -q --ignore-install ip_conntrack ; /sbin/sysctl -p /etc/sysctl.conf However I'm seeing instances where the setting still gets unset; i have yet to determine how. Cheers Christian I've logged a support call with red hat and the advise i got back was to use the modification of /etc/modprobe.conf . Since the end of february the problem has not recurred, i'm guessing there was some disconnect between observed configuration and observed behavior. Thus i think this is an non-issue... Cheers Christian There currently is no mechanism to specify that some sysctl values should be reloaded when iptables is reloaded. This can have severe impact on systems that have reason to use non-default values for net.ipv4.netfilter.ip_conntrack_* sysctls I have proposed a patch for bugID 552522 which provides this functionality, and by doing so (I believe) also addresses the concerns raised in this bug. *** This bug has been marked as a duplicate of bug 552522 *** |