1. Aktuelles
  2. Dashboard
  3. Forum
    1. Unerledigte Themen
  4. Mitglieder
    1. Letzte Aktivitäten
    2. Benutzer online
  5. Community vs. Enterprise
  • Anmelden
  • Registrieren
  • Suche
Dieses Thema
  • Alles
  • Dieses Thema
  • Dieses Forum
  • Artikel
  • Forum
  • Seiten
  • Erweiterte Suche
  1. efw-forum - Endian Firewall Support Forum
  2. Forum
  3. Tips,Tricks, HowTo´s, MODs
  4. Tips, Links

*Gelöst Squid Error (110) Connection timed out

  • Bios2001
  • 10. März 2013 um 12:35
  • Bios2001
    Anfänger
    Beiträge
    28
    • 10. März 2013 um 12:35
    • #1

    Hallo liebe Efw Gemeinde,
    beim Aufruf mancher Seiten bekommt man den o. g. Fehler. Die Seite ist einfach nicht aufrufbar. Nach wochenlangen Recherchen habe ich jetzt die Lösung gefunden. Auf der Seite http://www.comfsm.fm/computing/squid/FAQ-14.html findet sich der Hinweis. (Einfach nach 110 suchen).

    Code
    Can't connect to some sites through Squid
    
    
    When using Squid, some sites may give erorrs such as ``(111) Connection refused'' or ``(110) Connection timed out'' although these sites work fine without going through Squid.
    
    
    Some versions of linux implement Explicit Congestion Notification (ECN) and this can cause some TCP connections to fail when contacting some sites with broken firewalls or broken TCP/IP implementations.
    
    
    To work around such broken sites you can disable ECN with the following command:
    
    
    echo 0 > /proc/sys/net/ipv4/tcp_ecn
    
    
    Found this on the FreeBSD mailing list:
    
    
        From: Robert Watson
    
    
        As Bill Fumerola has indicated, and I thought I'd follow up in with a bit more detail, the behavior you're seeing is the result of a bug in the FreeBSD IPFW code. FreeBSD did a direct comparison of the TCP header flag field with an internal field in the IPFW rule description structure. Unfortunately, at some point, someone decided to overload the IPFW rule description structure field to add a flag representing "ESTABLISHED". They used a flag value that was previously unused by the TCP protocol (which doesn't make it safer, just less noticeable). Later, when that flag was allocated for ECN (Endpoint Congestion Notification) in TCP, and Linux began using ECN by default, the packets began to match ESTABLISHED rules regardless of the other TCP header flags. This bug was corrected on the RELENG_4 branch, and security advisory for the bug was released. This was, needless to say, a pretty serious bug, and good example of why you should be very careful to compare only the bits you really mean to, and should seperate packet state from protocol state in management structures, as well as make use of extensive testing to make sure rules actually have the effect you describe.
    
    
    See also the thread on the NANOG mailing list, RFC3168 "The Addition of Explicit Congestion Notification (ECN) to IP, PROPOSED STANDARD" or Sally Floyd's page on ECN and problems related to it
    Alles anzeigen

    Informationen dazu in Wiki: http://de.wikipedia.org/wiki/Explicit_…on_Notification

    Auf der endian lässt sich durch den Aufruf: echo 0 > /proc/sys/net/ipv4/tcp_ecn das ECN abschalten. Danach lassen sich diese Seiten aufrufen.

    Viele Grüße
    Thomas

    EFW 2.51 - Community
    Kabel - 32 MBit
    Celeron G530 - 2GB Ram
    ESXi 5.0 - 8GB Ram - 640GB HD
    3 * NIC

Unterstützt von

  1. Datenschutzerklärung
  2. Impressum
Community-Software: WoltLab Suite™