Request for a pointer - Linux modifying DSCP on replies?
darren at bolding.org
Mon Aug 17 18:08:26 CDT 2009
Perhaps it is outside the DS domain, and that is the issue. It seems odd
that the behavior with ICMP/Ping is different than that with TCP however.
Not sure which is technically correct, but I am going to follow up on some
of the pointers I've gotten to try and learn that. It just seems natural to
me that connection oriented traffic would have the same markings on both
sides of the conversation unless explicitly told otherwise.
I would love to be able to mark the traffic at the edge of the DS domain- I
do this at ingress from one location. The challenge I am trying to solve is
that the DS edge switch will not reliably know how to policy-route traffic
unless it has been previously marked.
To clarify, as in many other environments, we have stateful devices such as
firewalls and load balancers. I want to be able to route traffic
that ingressed through one of these devices to egress through it as well.
This is entirely solvable by splitting equipment functionally (a cluster of
servers and associated network equipment, real or virtual associated with a
service) or by employing SNAT solutions. However, for various reasons these
solutions are not preferred in our environment, and I dare say I am not
alone in that viewpoint.
What I am trying to deploy now is a system where the stateful equipment (in
this case a load balancer) has its traffic to the rest of the network tagged
on ingress. Since I am using Cisco 6500's with sup720's, I can classify and
mark the traffic with a DSCP setting via PFC/DFC hardware. I then inspect
traffic at the layer-3 edge for the various pools of servers. Depending on
the DSCP marking of the packet, I change the next-hop. Since this is
implemented through an extended ACL for a route-map it is handled in
hardware (a good thing). Research shows that I can implement similar
functionality in hardware on L3 switching gear from Juniper, Foundry, etc.
so I am not boxing myself into a vendor.
I don't believe Cisco supports using reflexive-acl's to apply policy
routing, and even if they did, that would likely swamp our sup's CPU's, so I
don't believe maintaining a stateful filter on the switch is viable.
This all works as expected for Ping's and the ICMP replies. It breaks down
for TCP http/mysql connections.
It sounds like the correct (per-spec) solution may be to have the Linux
servers track the incoming connections DSCP setting and mark the outgoing
packets related to those connections. I am not at all certain this will not
hit the servers CPU's more than desired or require additional
connection-tracking resources than the ones we currently implement via
Is there some other design option I am not considering?
Thanks to those of you who have replied so far, it is at least a start down
some additional paths of research for me! It's been since the days of BSDI
that I have been involved in system networking internals, so I have been at
a loss who to even ask!
On Mon, Aug 17, 2009 at 2:44 PM, Steve Miller <stmille at gmail.com> wrote:
> Would not the end station be considered to be outside of the DS
> domain? It does not necessarily make sense (to me) for reply packets
> to be marked unless they are appropriate classified and marked on the
> return path at the point they re-enter the DS domain.
> I would imagine that iptables and the DSCP target would do what you
> wanted, yes. I'd consider classifying and marking traffic at whatever
> switch you would consider to be at the edge of the DS domain
> (connected to this server.)
> 2009/8/17 Darren Bolding <darren at bolding.org>:
> > I believe this is operational content, but may well be better asked
> > somewhere else. I would love to have a pointer to another list/website.
> > I am looking to do some policy routing based on DSCP marking, and I have
> > this all working inside the networking equipment. I DSCP mark some
> > at ingress and I policy-route others based on ACL's matching those DSCP
> > markings. This should allow me to solve some problems in a rather
> > manner, if I do say so myself.
> > And this works fine for some things- I have verified that Ping's to a
> > work as expected- the Ping shows up at the destination host DSCP marked,
> > the ICMP reply leaves with the same DSCP marking.
> > However, when I do this with apache and mysql connections (TCP 80/3306),
> > incoming packets are marked, but the replies are not.
> > My research into the subject doesn't seem to suggest there is a standard
> > whether replies to a TCP connection are required to have the same DSCP
> > marking, but it seems to make a lot of sense that they would.
> > I've disabled iptables on the server host to no avail. I've looked
> > for an apache or Linux kernel setting and found nothing.
> > At this point I'm looking for pointers- to a way to solve this issue, or
> > a better place to ask.
> > I've started investigating writing iptables rules to match incoming
> > connections that have DSCP marking and explicitly mark response traffic,
> > that seems, I don't know... wrong.
> > Linux kernel we are using is 2.6.9-67.ELsmp.
> > Any help or pointers would be appreciated!
> > --D
> > --
> > -- Darren Bolding --
> > -- darren at bolding.org --
> Steve Miller, CCIE #23977 (R&S), RHCE
> Key fingerprint = 5CE3 A789 4CF5 666F 5CD6 2A8E 3132 77C7 483F 5F9D
-- Darren Bolding --
-- darren at bolding.org --
More information about the NANOG