Files
geedge-jira/md/OMPUB-466.md
2025-09-14 22:27:11 +00:00

44 KiB
Raw Blame History

【E21现场】IGW站点security policy block www.target.com 失败

ID Creation Date Assignee Status
OMPUB-466 2022-04-26T22:02:07.000+0800 刘学利 已关闭

业主自己尝试配置security policy  block 网站:[https://www.target.com/]

策略配置如下:

client ip=196.188.136.150办公室公网ip

applicationssl 

sni-FQDN:*target.com

                 *targetimg1.com

                  $target.scene7.com

                  $target.com

Sub Action:reset

Effective Devices{color:#0747a6}所有IGW站点{color}

 

策略测试效果:

浏览器一直访问[https://www.target.com/ |https://www.target.com/],最初无法访问成功,大概一分钟左右网站可以正常访问。

 

并将以下内容上传到附件中:

策略配置内容截图

处理机计算板上drop情况

该策略安全策略命中日志

会话日志里搜索sni =%target% client ip=196.188.136.150导出session records

 

查询安全策略命中日志和会话日志时stream direction 只看到double 和c2s,没有s2c日志记录。

 

 liuxueli commented on 2022-04-27T10:01:47.937+0800:

  • [~liuju] 这种问题需要现场捕包,在客户端捕包发我,我分析一下
  • 另外我在京版尝试能不能复现

dongxiaoyan commented on 2022-04-27T10:44:19.639+0800:

[~liuxueli]信息港复测: 1、浏览器正常访问多访问几次打开一次 2、无痕模式访问一直未打开 3、再次清理缓存后浏览器正常访问隔几分钟刷新一次一直未打开


liuxueli commented on 2022-04-27T11:45:50.356+0800:

  • 京版复现情况(京版环境不能稳定复现)

** 京版唯一复现的一次同时开启了捕包数据包中存在18个ssl链接的SNI包含(target.com)的域名, *** 16个链接在client hello收到功能端发出的RESET后链接关闭 *** 2个链接未收到RESET,,链接正常建立 **** 在SessionRecord中未查到该2个链接的记录客户端端口为17375/17376 **** SSL解析层测试18个链接均能解析出SNI *** [^18-target.com.pcap]


gitlab commented on 2022-04-27T11:49:29.384+0800:

[刘学利|https://git.mesalab.cn/liuxueli] mentioned this issue in [a commit|8e49d1f437] of [MESA Platform / ssl|https://git.mesalab.cn/MESA_Platform/ssl] on branch bugfix-add-test-case|https://git.mesalab.cn/MESA_Platform/ssl/-/tree/bugfix-add-test-case:{quote}OMPUB-466: 增加相应的测试用例{quote}


liuxueli commented on 2022-04-27T11:51:39.774+0800:


liuxueli commented on 2022-04-27T15:20:25.195+0800:

  • E现场复测客户端未收到RESET包查看日志发现RESET包发送失败报错 ** 参见TSG-10508 

liuxueli commented on 2022-04-27T17:29:09.456+0800:

  • 分析E现场反馈回来数据包有3个链接未阻断成功经分析原因在Bole IGW站点的CPU使用过载触发SAPP overload protection机制导致链接被Bypass(sapp未建立对应的流表) ** 当单核CPU使用率超95%时会触发SAPP的overload protection机制SAPP配置文件如下

** *** !image-2022-04-27-17-53-42-859.png!   ** 分析在NPB上捕获的数据包找到3个未阻断成功链接对应的client ISN查询SessionRecord日志仅在Old Airport站点查到日志 *** NPB捕获的数据包 **** [^target.com-196.188.136.150-151.101.2.187.443.pcap]  *** Session日志记录 **** [^sessionRecords-deny-target.com-failed.xlsx] ** 查看NPB DDOS Bypass监控TCP Bypass 3~5K/S个链接UDP Bypass 1.55K/S个链接 *** !image-2022-04-27-17-12-00-094.png|width=1090,height=508! ** 查看NPB原始流量 *** !image-2022-04-27-17-14-25-901.png|width=1093,height=506! **  查看NPB 整体CPU使用率 *** !image-2022-04-27-17-15-02-774.png|width=1079,height=492! ** 查看NPB 单核CPU使用率 *** !image-2022-04-27-17-17-32-639.png! ** 查看perf top -C cpuid的结果 *** !image-2022-04-27-17-19-09-881.png!   *** !image-2022-04-27-17-18-43-458.png! ** 查看火焰图 *** [^perf.svg] *** [^perf33.svg] *** [^perf37.svg] *** [^perf40.svg]


liuxueli commented on 2022-04-27T17:36:10.537+0800:

  • 火焰图中_int_malloc调用较多的地方 ** tsg_master *** !image-2022-04-27-17-36-03-049.png|width=1139,height=433! ** MAAT *** !image-2022-04-27-17-35-20-050.png|width=1152,height=213! **  

liuxueli commented on 2022-04-28T10:27:29.680+0800:

  • E现场反馈回来的扫描状态显示FQDN命中率较高 ** APP SKETCH扫描状态[^app_sketch_maat.txt] *** FQDN识别特征命中率为80% *** APP_SIG_SESSION_ATTRIBUTE_STRING表命中率: 35% *** APP_SIG_SESSION_ATTRIBUTE_INTEGER表命中率: 10% ** TSG功能端扫描状态[^tsg_static_maat.txt] *** FQDN命中率为: 58% *** KEYWORDS命中率: 3.6% *** APP_ID命中率: 96%(无性能影响) *** FQDN_CAT命中率: 100%(无性能影响)

liuxueli commented on 2022-04-28T11:03:48.107+0800:

  • [~liuju] 到现场后备份一下Bifang的MariaDB我需要验证现场的哪个FQDN的对象命中率比较高 ** 京版环境可能跟现场有差别
  • E现场备份回来的21.11版本存在重复的FQDN Object现象具体列表 ** [^e21-version-21.11-dup-fqdn-object.txt] ** ^经分析确认为APP内置特征(VPN)一个FQDN在多个Object中出现^ ** ^对应BUG: TSG-10517^

liuxueli commented on 2022-04-28T14:34:33.918+0800:

  • E现场备份回来的Bifang MariaDB v21.11版本发现APP内置特征中包含三个极易命中的特征 ** APP_SIG_SESSION_ATTRIBUTE_STRING

{code:java} 12482085    113748    http.user_agent    chrome    0    0    0    1    1639035425000000 0 9021592    112096    http.user_agent    Chrome    0    0    0    1    1637987142000000 0 9021593    112097    http.content_type    text/html    0    0    0    1    1637987142000000 0 {code}


zhengchao commented on 2022-04-28T14:41:38.582+0800:

现场http的比例多大是触发overload protection的原因吗


liuxueli commented on 2022-04-28T15:43:28.368+0800:

  • Bole IGW NPB5的协议统计HTTP的比例8%可能是APP_SIG_SESSION_ATTRIBUTE_STRING表命中率较高的原因 ** 导出PDF结果中QUIC拼写错误参见TSG-10523   ** [^L7protocal_sessions-Bole IGW NPB2.csv] ** [^L7protocal_sessions-Bole IGW NPB5.csv] **  [^L7protocal_sessions-all-NPB.csv] ** [^L7protocal_sessions-all-NPB-new.csv] ** !image-2022-04-28-15-43-09-227.png!

liuxueli commented on 2022-04-28T16:27:44.265+0800:

  • FQDN扫描命中率高的原因应该是APP_SKETCH扫描了TOPN SNI识别Psiphon3和Freegate非的条件。 ** [^Bole IGW NPB5-http_domain_session.csv] ** [^Bole IGW NPB5-QUIC.SNI_session.csv] ** [^Bole IGW NPB5-SSL.SNI_session.csv]

liuxueli commented on 2022-04-28T16:54:53.829+0800:

  • APP_SKETCH扫描了TOPN SNI高命中率导致的CPU跑满从而引发Bole IGW站点的SAPP overload protection机制导致链接被Bypass。[~luqiuwen] 

zhengchao commented on 2022-04-28T17:01:59.390+0800:

IGW能不能把TFE的CPU让出来[~luqiuwen] 


luqiuwen commented on 2022-04-28T17:02:57.016+0800:

可以在IGW的计算板上关闭Proxy功能将Proxy使用的CPU资源调整为Firewall使用。Provision中已预留相关选项操作步骤

  • 修改/data/tsg-os-provision/provision.yml文件将proxy->enable选项由1调整为0

{code:java} proxy:   enable: 1 {code} 修改为: {code:java} proxy:   enable: 0 {code}

  • 令上述配置生效,运行:

{code:java} $ sudo provision-config-apply{code}

  • 检查tfe是否在运行

{code:java} $ systemctl status tfe ● tfe.service - Tango Frontend Engine    Loaded: loaded (/usr/lib/systemd/system/tfe.service; disabled; vendor preset: disabled)   Drop-In: /usr/lib/systemd/system/tfe.service.d            └─require-mrzcpd.conf, service_add_ConditionPathExists.conf, service_override_env.conf, service_override_slice.conf    Active: inactive (dead) since Thu 2022-04-28 11:46:17 EAT; 15min ago   Process: 18732 ExecStart=/opt/tsg/tfe/bin/tfe (code=killed, signal=TERM)  Main PID: 18732 (code=killed, signal=TERM){code} 其中Active项应为inactive。

需要考虑的问题是:

  • 在关闭Proxy功能后所有拦截策略和代理策略将无法在IGW生效如何向业主解释。

zhengchao commented on 2022-04-28T17:06:42.366+0800:

对业主解释由于IGW存在单向流Proxy功能不在IGW生效。


gitlab commented on 2022-04-28T18:18:44.475+0800:

[刘学利|https://git.mesalab.cn/liuxueli] mentioned this issue in [a merge request|https://git.mesalab.cn/MESA_Platform/ssl/-/merge_requests/34] of [MESA Platform / ssl|https://git.mesalab.cn/MESA_Platform/ssl] on branch [feature-add-test-case|https://git.mesalab.cn/MESA_Platform/ssl/-/tree/feature-add-test-case]:{quote}OMPUB-466: 增加相应的测试用例{quote}


liuxueli commented on 2022-04-29T09:44:47.117+0800:

  • Bole IGW NPB5 TFE的CPU让出来后被SAPP主动Bypass的链接有减少但是没有完全消除 ** !image-2022-04-29-09-44-38-025.png|width=1108,height=549!

liuxueli commented on 2022-04-29T10:19:39.687+0800:

  • [~liuju] 到现场后把/opt/tsg/sapp/sysinfo.log文件发回来一份。 ** [^Bole IGW NPB5 sysinfo.log]

liuxueli commented on 2022-05-05T14:23:24.256+0800:

  • 新疆环境统计xx.xxx.192.175 ** 实时流量约6Gbpsmonit_device统计 ***   *** !XJ-192.175-monit_device.png! ** 整体的CPU使用率单核使用率均在60~65%左右: *** !XJ-192.175-top-all-cpu.png|thumbnail! ** SAPP的TCP/UDP链接流标大小为100000sysinfo统计 [^XJ-192.175-sysinfo.txt] *** !XJ-192.175-sysinfo.png! ** TSG MAAT句柄的扫描状态统计[^XJ-192.175-tsg_static_maat.txt] *** FQDN字符串扫描命中率为53% *** IP归属地字符串扫描命中率为51%  *** !XJ-192.175-tsg-maat.png! ** APP MAAT句柄扫描统计[^XJ-192.175-app_sketch_maat.txt] ***  FQDN字符串扫描命中率为66% *** !XJ-192.175-app-maat.png! ** 单核CPU使用perf top -C 6 *** !XJ-192.175-perf-top-cpu6.png! ** CPU 6的火焰图[^XJ-192.175-perf-cpu-6.svg] *** ^__clock_gettime 是SAPP统计包处理延时造成的E现场未开启该功能^

zhengchao commented on 2022-05-05T14:45:02.941+0800:

FQDN对比命中率、扫描性能({}PROC_Tps{})相近E21的扫描次数{}(IN_Tps=5.30e+04){}是新疆(1.62e+04)的3倍 {code:java} TSG_OBJ_FQDN (XJ)                160158             0             0      2.86e+05      5.66e+06      1.62e+04      3.20e+05      5.72e-01 TSG_OBJ_FQDN (E21)                 4532             0             0      1.15e+06      7.26e+06      5.30e+04      3.36e+05      5.80e-01 {code}  


yangwei commented on 2022-05-05T14:53:03.447+0800:

补充说明:

新疆单核perf排名第一的函数为clock_get_time原因是sapp开启了包处理延迟统计E现场没有开启该功能

新疆CPU型号为Intel(R) Xeon(R) Silver 4114 CPU @ 2.20GHz9140的CPU型号为Intel(R) Xeon(R) CPU E5-2680 v4 @ 2.40GHz


liuxueli commented on 2022-05-06T11:00:08.046+0800:

  • 使用京版E现场升级验证环境测试仪表构造流量加载E现场的配置 ** {color:#de350b}测试结果不加载E现场的APP特征配置新建性能可以提升一倍{color} *** {color:#de350b}新建由3.3万/s提升到7.3wan/s{color} *** {color:#de350b}其中加载E现场APP特征损耗CPU较多的函数为“msort_with_tmp”{color} ** {color:#172b4d}测试分为两组对比测试,{color}

** *** {color:#172b4d}加载E现场APP特征配置{color} **** {color:#172b4d}整体CPU使用率{color} ***** {color:#172b4d}!XXG-40.82-load-app-maat-all-cpu.png!{color} **** {color:#172b4d}单核CPU使用率perf top -C 14{color} ***** {color:#172b4d}!XXG-40.82-load-app-maat-perf-top-cpu14.png!{color} **** SAPP处理新建连接数({color:#de350b}3.3万/s{color})[^XXG-40.82-load-app-maat-sysinfo.txt] ***** !XXG-40.82-load-app-maat-new-link.png! *** {color:#172b4d}不加载E现场APP特征配置{color} **** {color:#172b4d}整体CPU使用率{color} ***** !XXG-40.82-no-app-maat--all-cpu.png! **** {color:#172b4d}单核CPU使用率perf top -C 14{color} ***** {color:#172b4d}!XXG-40.82-no-app-maat-perf-top-cpu14.png!{color} **** {color:#172b4d}SAPP处理新建连接数(7.3万/s{color})[^XXG-40.82-no-app-maat-sysinfo.txt] ***** !XXG-40.82-no-app-maat-new-link.png!


liuxueli commented on 2022-05-06T11:01:15.064+0800:

  • 等待[~zhangwei] 优化APP特征组织结构后进行复测。 ** 去除APP特征中APP ID的引用

yangwei commented on 2022-05-06T18:21:12.898+0800:

分析E现场使用的App特征在APP_SIG_SESSION_ATTRIBUTE_INTEGER表中general.session.analysis.app_id存在较多重复

  • 如下图所示第一列为重复次数第二列为AppID其中67为HTTP199为SSL按前述统计这俩种协议分别占E现场流量的65%和8%

可以部分解释前述在新建连接较高的情况下单核出现CPU使用较高perf采样占用第一的为msort_xxx函数调用导致触发sapp自我保护的现象

!image-2022-05-06-18-15-08-649.png!


liuxueli commented on 2022-05-07T16:16:36.389+0800:

  • 优化APP特征组织结构后进行复测去除APP特征中APP ID的引用使用同一个数据包进行测试对比APP的识别结果 ** {color:#de350b}优化前单核新建处理能力为: 1000/s单核CPU使用率75%左右{color} ** {color:#de350b}优化后单核新建处理能力为: 2500/s单核CPU使用率80%左右 {color} ** {color:#de350b}有3个APP识别结果不一致{color} *** {color:#de350b}!image-2022-05-07-16-12-05-474.png!{color}

zhengchao commented on 2022-05-07T17:00:00.363+0800:

确认优化后的AppSketchDB可以在22.02版本正确加载之后提供给E21现场。


liuxueli commented on 2022-05-09T10:51:10.555+0800:

  • App_GooseVPN_20211208识别结果存在差别分析App_GooseVPN_20211208特征特征条件变化可能导致一定的误识别 ** {color:#de350b}优化前特证IP+PROTOCOl(IKE){color} ** {color:#de350b}优化后特征仅IP{color}

liuxueli commented on 2022-05-09T17:24:52.318+0800:

  •  调整App_GooseVPN_20211208的特征引用app_id=IKE的特征保留
  • 手动删除其余对app_id特征的引用优化前后的APP识别结果一致Psiphon3、unknown除外。 ** {color:#de350b}E现场升级验证环境Psiphon3的识别特征有变化导致识别结果存在差异识别结果变少{color} ** {color:#de350b}Psiphon3识别结果减少unknown相应会增加{color}
  • {color:#172b4d}已提供至[~liuju] E21现场更新{color}

liuju commented on 2022-05-09T22:01:03.929+0800:

1、已根据张东旭提供的《E现场修正app特征操作说明》文档完成对E现场列表里提供的所有app自定义特征进行修改更新将general.session.analysis.app_id的Condition删除。

2、并根据提供的sql语句对更新结果进行验证验证更新无误。[~liuxueli] 


liuxueli commented on 2022-05-10T09:37:05.586+0800:

  • [~liuju] 观察Nezha监控上的DDOS Bypass的统计是否还存在
  • 统计自定义APP的特征修正前后识别链接数是否较大的差异统计12小时 ** 统计Session Record日志中的common_app_label字段
  • 登录Bole  IGW NPB5查看一下整体CPU使用perf top -C cpuid看一下单核的CPU

liuxueli commented on 2022-05-10T17:47:36.817+0800:

  • 建议[~liuju] 申请在IGW站点复测业主提出的网站阻断效果不佳的问题
  • 优化APP自定义特征后观察Bole IGW的统计{color:#de350b}其中由于SAPP overload protection机制导致链接被Bypass的统计(DDOS Bypass)降为0{color}{color:#de350b}偶尔会存在几个链接被Byapss{color} ** Nezha统计新建及DDOS Bypass *** !Bole IGW NPB1 new connect.png! *** !Bole IGW NPB1 DDOS Bypass connect.png! *** !Bole IGW NPB2 new connect.png! *** !Bole IGW NPB2 DDOS Bypass connect.png! *** !Bole IGW NPB3 new connect.png! *** !Bole IGW NPB3 DDOS Bypass connect.png!

liuxueli commented on 2022-05-10T17:50:27.077+0800:

  • [~liuju] Bole IGW NPB5 Nezha采集出现异常请另外提一个BUG。

liuju commented on 2022-05-10T21:19:49.593+0800:

[~liuxueli] 好的 采集问题已提交BUG  另外在IGW站点业主提出的网站阻断效果不佳的问题业主已在进行复测后续有结果会继续反馈


liuxueli commented on 2022-05-13T17:39:22.275+0800:

  • 从现场Nezha监控看{color:#de350b}目前Bole IGW NPB5还存在由于SAPP overload protection机制导致链接被Bypass流量峰值(10Gbps左右)时Bypass 2K/s个链接CPU使用率在60%左右{color} ** {color:#172b4d}OMPUB-481影响20220511~20220512统计出现异常在20220512北京时间晚上重启sapp恢复统计{color} ** {color:#172b4d}DDOS Bypass统计{color} *** {color:#172b4d}!Bole IGW NPB5 DDOS bypass 20220513.png|width=1743,height=810!{color} ** {color:#172b4d}新建链接统计{color} *** {color:#172b4d}!Bole IGW NPB5 new connections 20220513.png|width=1777,height=827!{color} ** {color:#172b4d}流量统计{color} *** {color:#172b4d}!Bole IGW NPB5 throughtput 20220513.png|width=1581,height=743!{color} ** {color:#172b4d}CPU使用率{color} *** !Bole IGW NPB5 CPU 20220513.png! ** {color:#172b4d}perf top -C 32/44{color} *** {color:#172b4d}!Bole IGW NPB5 perf top cpu32 20220513.png!{color} *** {color:#172b4d}!Bole IGW NPB5 perf top cpu44 20220513.png!{color}

liuxueli commented on 2022-05-16T15:33:32.233+0800:

  • [~liuju] 建议关闭Bole IGW NPB SAPP的bypass功能修改配置项 ** 修改/data/tsg-os-provision/provision.yml文件将feature->enable_stream_bypass_under_ddos选项由1调整为0 *** !image-2022-05-16-15-33-27-227.png! ** 执行命令使上述配置生效,运行: *** sudo provision-config-apply ** 执行完成后检查sapp配置文件etc/sapp.toml *** stream_bypass_enabled=0  *** !image-2022-05-16-15-32-36-510.png!

liuju commented on 2022-05-16T23:59:04.497+0800:

BOLE-IGW 10.225.11.1~5 已经按你的更新要求完成更新现在均已检查完更新之后配置stream_bypass_enabled=0。[~liuxueli] 待明天申请配置策略效果验证完,告诉更新之后的效果。


liuxueli commented on 2022-05-17T08:50:35.226+0800:

  • [~liuju] 观察Bole IGW 是否存在丢包现象。

liuju commented on 2022-05-17T20:50:49.691+0800:

关闭Bole IGW NPB SAPP的bypass功能后今天业主重新进行复测IGW站点 security policy deny功能复测结果都deny成功。[~liuxueli] 墨处询问该问题的具体原因,我回复说我需要告诉你们复测结果之后,待家里你们再告知我具体问题原因。墨处要求明天知道问题原因。


zhengchao commented on 2022-05-17T21:09:19.754+0800:

回复业主:问题原因北京还在定位。

[~liuju]  观察Bole IGW 是否存在丢包现象。


liuju commented on 2022-05-17T21:14:30.862+0800:

收到,好的[~zhengchao]   BOLE-IGW 早上和现场观察结果还存在丢包。具体每个NPB丢包情况已微信提供给学利。


liuxueli commented on 2022-05-18T10:04:24.965+0800:

  • Bole IGW 存在偶尔丢包的情况范围在200~1300pps[~liuju] 需要同步丢包时刻的流量、CPU的监控 ** !Bole IGW NPB1 application drop pkts.png! ** !Bole IGW NPB2 application drop pkts.png! ** !Bole IGW NPB3 application drop pkts.png! ** !Bole IGW NPB4 application drop pkts.png! ** !Bole IGW NPB5 application drop pkts.png!

liuju commented on 2022-05-18T15:18:25.026+0800:

好的[~liuxueli] BOLE-IGW 最近24小时丢包及流量、CPU情况 截图 因本地网络上传jira困难已将数据图片微信发送给你。


liuxueli commented on 2022-05-24T17:07:53.129+0800:

  • [~liuju] 观察Nezha监控找一个由于CPU使用过载触发SAPP overload protection机制导致链接被Bypass较多得NPB调整SAPP的配置文件观察Bypass的情况 ** 调整SAPP参数位于sapp.toml{color:#de350b}bypass_trigger_cpu_usage参数值由90改为99{color}重启SAPP观察bypass的情况 *** !image-2022-05-24-17-06-33-618.png!

liuju commented on 2022-05-25T15:15:02.793+0800:

[~zhengchao] 超哥,业主处长这近期一直追问进展,故障原因。


liuju commented on 2022-05-25T15:31:32.750+0800:

[~liuxueli] 已对比近7天bypass数据之后 挑选了MWV-IGW 10.227.11.9  修改了/opt/tsg/sapp/etc/sapp.toml配置内容bypass_trigger_cpu_usage=90改完bypass_trigger_cpu_usage=99,已重启sapp待观察更新后效果。


zhengchao commented on 2022-05-25T16:56:30.458+0800:

[~liuxueli] 提供新的TSG OS文件22.02继续升级。

IGW站点的overload bypass的阈值调整为99。[~yangwei] 

请 [~liuju] 提供现场perf研发进一步优化性能。


zhengchao commented on 2022-05-25T16:58:01.728+0800:

回复业主由于之前的App特征过于消耗计算资源影响了阻断功能目前已优化了一轮正在线上观察效果。北京方面也在开展更进一步的优化。 {quote}超哥,业主处长这近期一直追问进展,故障原因。 {quote}


liuju commented on 2022-05-25T22:09:07.905+0800:

嗯嗯,好的~收到!


liuxueli commented on 2022-05-26T15:24:58.130+0800:

  • 20220526查看Bole IGW NPB5的CPU使用情况查看perf top cpu48的使用分布 ** 使用top查看整体CPU使用 *** !Bole IGW NPB5 all cpu 20220526.png! ** perf top cpu48结果 *** !Bole IGW NPB5 perf top cpu48 20220526.png!

liuxueli commented on 2022-05-31T09:46:06.827+0800:

  • [~liuju] 鉴于IGW站点的overload bypass的阈值调整为99后还存在Bypass的现象找两个Bypass较多的NPB ** 一个NPB使用cpuages采集CPU的使用率采集24小时 ** 一个NPB调整sapp配置文件(/opt/tsg/sapp/etc/sapp.toml)参数smooth_avg_window有2调整为20 *** !image-2022-05-31-09-44-22-020.png! ** !image-2022-05-31-09-45-23-952.png! ** !image-2022-05-31-09-46-02-588.png!

liuju commented on 2022-05-31T14:28:57.759+0800:

收到  好的[~liuxueli] 


liuxueli commented on 2022-06-10T15:38:27.387+0800:

  • NPB调整sapp配置文件(/opt/tsg/sapp/etc/sapp.toml)参数smooth_avg_window有2调整为20还是存在被SAPP Bypass的链接 ** !image-2022-06-10-15-36-23-768.png! ** !image-2022-06-10-15-37-33-666.png! ** !image-2022-06-10-15-38-10-175.png! **  

liuxueli commented on 2022-06-10T16:49:20.613+0800:

  • [~liuju] smooth_avg_window参数由2调整为20 的NPB使用cpusage命令采集一下CPU的使用率

liuxueli commented on 2022-06-15T10:14:53.829+0800:

  • smooth_avg_window参数由2调整为20 的NPB还是存在Bypass的情况查看cpusage采集的CPU使用率Bypass前后时刻的CPU单核使用率均未超过95%[yangwei]  ** 采集日志及截图存在于: 40.146:/home/E21/CPU2022061020220611.zip

liuxueli commented on 2022-06-17T16:45:53.990+0800:

  • 京版9140环境也存在链接被SAPP Bypass的现象。 ** !XXG-9140.sapp.bypass.png!

gitlab commented on 2022-07-29T10:24:05.585+0800:

[刘学利|https://git.mesalab.cn/liuxueli] mentioned this issue in [a merge request|https://git.mesalab.cn/MESA_Platform/ssl/-/merge_requests/35] of [MESA Platform / ssl|https://git.mesalab.cn/MESA_Platform/ssl] on branch [feature-add-test-case|https://git.mesalab.cn/MESA_Platform/ssl/-/tree/feature-add-test-case]:{quote}OMPUB-466: 增加SSL相应的测试用例{quote}


gitlab commented on 2022-07-29T10:24:09.209+0800:

[刘学利|https://git.mesalab.cn/liuxueli] mentioned this issue in [a commit|1325788848] of [MESA Platform / ssl|https://git.mesalab.cn/MESA_Platform/ssl] on branch [master|https://git.mesalab.cn/MESA_Platform/ssl/-/tree/master]:{quote}OMPUB-466: 增加SSL相应的测试用例{quote}


Attachments

Attachment: 18-target.com.pcap

18-target.com.pcap

Attachment: app_sketch_maat.txt

app_sketch_maat.txt

Attachment: Bole+IGW++NPB1+application+drop+pkts.png

Bole+IGW++NPB1+application+drop+pkts.png

Attachment: Bole+IGW++NPB1+application+drop+pkts-1.png

Bole+IGW++NPB1+application+drop+pkts-1.png

Attachment: Bole+IGW++NPB1+DDOS+Bypass++connect.png

Bole+IGW++NPB1+DDOS+Bypass++connect.png

Attachment: Bole+IGW++NPB1+new+connect.png

Bole+IGW++NPB1+new+connect.png

Attachment: Bole+IGW++NPB2+application+drop+pkts.png

Bole+IGW++NPB2+application+drop+pkts.png

Attachment: Bole+IGW++NPB2+application+drop+pkts-1.png

Bole+IGW++NPB2+application+drop+pkts-1.png

Attachment: Bole+IGW++NPB2+DDOS+Bypass++connect.png

Bole+IGW++NPB2+DDOS+Bypass++connect.png

Attachment: Bole+IGW++NPB2+new+connect.png

Bole+IGW++NPB2+new+connect.png

Attachment: Bole+IGW++NPB3+application+drop+pkts.png

Bole+IGW++NPB3+application+drop+pkts.png

Attachment: Bole+IGW++NPB3+application+drop+pkts-1.png

Bole+IGW++NPB3+application+drop+pkts-1.png

Attachment: Bole+IGW++NPB3+DDOS+Bypass++connect.png

Bole+IGW++NPB3+DDOS+Bypass++connect.png

Attachment: Bole+IGW++NPB3+new+connect.png

Bole+IGW++NPB3+new+connect.png

Attachment: Bole+IGW++NPB4+application+drop+pkts.png

Bole+IGW++NPB4+application+drop+pkts.png

Attachment: Bole+IGW++NPB4+application+drop+pkts-1.png

Bole+IGW++NPB4+application+drop+pkts-1.png

Attachment: Bole+IGW+NPB5+all+cpu+20220526.png

Bole+IGW+NPB5+all+cpu+20220526.png

Attachment: Bole+IGW++NPB5+application+drop+pkts.png

Bole+IGW++NPB5+application+drop+pkts.png

Attachment: Bole+IGW++NPB5+application+drop+pkts-1.png

Bole+IGW++NPB5+application+drop+pkts-1.png

Attachment: Bole+IGW+NPB5+CPU+20220513.png

Bole+IGW+NPB5+CPU+20220513.png

Attachment: Bole+IGW+NPB5+DDOS+bypass+20220513.png

Bole+IGW+NPB5+DDOS+bypass+20220513.png

Attachment: Bole+IGW+NPB5-http_domain_session.csv

Bole+IGW+NPB5-http_domain_session.csv

Attachment: Bole+IGW+NPB5+new+connections+20220513.png

Bole+IGW+NPB5+new+connections+20220513.png

Attachment: Bole+IGW+NPB5+perf+top+cpu32+20220513.png

Bole+IGW+NPB5+perf+top+cpu32+20220513.png

Attachment: Bole+IGW+NPB5+perf+top+cpu44+20220513.png

Bole+IGW+NPB5+perf+top+cpu44+20220513.png

Attachment: Bole+IGW+NPB5+perf+top+cpu44+20220513-1.png

Bole+IGW+NPB5+perf+top+cpu44+20220513-1.png

Attachment: Bole+IGW+NPB5+perf+top+cpu48+20220526.png

Bole+IGW+NPB5+perf+top+cpu48+20220526.png

Attachment: Bole+IGW+NPB5-QUIC.SNI_session.csv

Bole+IGW+NPB5-QUIC.SNI_session.csv

Attachment: Bole+IGW+NPB5-SSL.SNI_session.csv

Bole+IGW+NPB5-SSL.SNI_session.csv

Attachment: Bole+IGW+NPB5+sysinfo.log

Bole+IGW+NPB5+sysinfo.log

Attachment: Bole+IGW+NPB5+throughtput+20220513.png

Bole+IGW+NPB5+throughtput+20220513.png

Attachment: E21-sapp-overload-protection-bypass-20220427~20220503.png

E21-sapp-overload-protection-bypass-20220427~20220503.png

Attachment: e21-version-21.11-dup-fqdn-object.txt

e21-version-21.11-dup-fqdn-object.txt

Attachment: image-2022-04-27-17-12-00-094.png

image-2022-04-27-17-12-00-094.png

Attachment: image-2022-04-27-17-14-25-901.png

image-2022-04-27-17-14-25-901.png

Attachment: image-2022-04-27-17-15-02-774.png

image-2022-04-27-17-15-02-774.png

Attachment: image-2022-04-27-17-17-32-639.png

image-2022-04-27-17-17-32-639.png

Attachment: image-2022-04-27-17-18-43-458.png

image-2022-04-27-17-18-43-458.png

Attachment: image-2022-04-27-17-19-09-881.png

image-2022-04-27-17-19-09-881.png

Attachment: image-2022-04-27-17-35-20-050.png

image-2022-04-27-17-35-20-050.png

Attachment: image-2022-04-27-17-36-03-049.png

image-2022-04-27-17-36-03-049.png

Attachment: image-2022-04-27-17-53-42-859.png

image-2022-04-27-17-53-42-859.png

Attachment: image-2022-04-28-15-43-09-227.png

image-2022-04-28-15-43-09-227.png

Attachment: image-2022-04-29-09-44-38-025.png

image-2022-04-29-09-44-38-025.png

Attachment: image-2022-05-06-18-15-08-649.png

image-2022-05-06-18-15-08-649.png

Attachment: image-2022-05-07-16-12-05-474.png

image-2022-05-07-16-12-05-474.png

Attachment: image-2022-05-16-15-32-36-510.png

image-2022-05-16-15-32-36-510.png

Attachment: image-2022-05-16-15-33-27-227.png

image-2022-05-16-15-33-27-227.png

Attachment: image-2022-05-24-17-06-33-618.png

image-2022-05-24-17-06-33-618.png

Attachment: image-2022-05-31-09-44-22-020.png

image-2022-05-31-09-44-22-020.png

Attachment: image-2022-05-31-09-45-23-952.png

image-2022-05-31-09-45-23-952.png

Attachment: image-2022-05-31-09-46-02-588.png

image-2022-05-31-09-46-02-588.png

Attachment: image-2022-06-10-15-36-23-768.png

image-2022-06-10-15-36-23-768.png

Attachment: image-2022-06-10-15-37-33-666.png

image-2022-06-10-15-37-33-666.png

Attachment: image-2022-06-10-15-38-10-175.png

image-2022-06-10-15-38-10-175.png

Attachment: L7protocal_sessions-all-NPB.csv

L7protocal_sessions-all-NPB.csv

Attachment: L7protocal_sessions-all-NPB-new.csv

L7protocal_sessions-all-NPB-new.csv

Attachment: L7protocal_sessions-Bole+IGW+NPB2.csv

L7protocal_sessions-Bole+IGW+NPB2.csv

Attachment: L7protocal_sessions-Bole+IGW+NPB5.csv

L7protocal_sessions-Bole+IGW+NPB5.csv

Attachment: L7protocol_sessions-Bole+IGW+NPB5.pdf

L7protocol_sessions-Bole+IGW+NPB5.pdf

Attachment: L7protocol_ssesion-all-NPB.pdf

L7protocol_ssesion-all-NPB.pdf

Attachment: L7protocol_ssesion-Bole+IGW+NPB2.pdf

L7protocol_ssesion-Bole+IGW+NPB2.pdf

Attachment: perf.svg

perf.svg

Attachment: perf33.svg

perf33.svg

Attachment: perf33-1.svg

perf33-1.svg

Attachment: perf37.svg

perf37.svg

Attachment: perf40.svg

perf40.svg

Attachment: securityEvents-target.xlsx

securityEvents-target.xlsx

Attachment: sessionRecords-deny-target.com-failed.xlsx

sessionRecords-deny-target.com-failed.xlsx

Attachment: sessionRecords+-target-clientip.xlsx

sessionRecords+-target-clientip.xlsx

Attachment: target.com-196.188.136.150-151.101.2.187.443.pcap

target.com-196.188.136.150-151.101.2.187.443.pcap

Attachment: tsg_static_maat.txt

tsg_static_maat.txt

Attachment: XJ-192.175-app_sketch_maat.txt

XJ-192.175-app_sketch_maat.txt

Attachment: XJ-192.175-app-maat.png

XJ-192.175-app-maat.png

Attachment: XJ-192.175-monit_device.png

XJ-192.175-monit_device.png

Attachment: XJ-192.175-perf-cpu-6.svg

XJ-192.175-perf-cpu-6.svg

Attachment: XJ-192.175-perf-top-cpu6.png

XJ-192.175-perf-top-cpu6.png

Attachment: XJ-192.175-sysinfo.png

XJ-192.175-sysinfo.png

Attachment: XJ-192.175-sysinfo.txt

XJ-192.175-sysinfo.txt

Attachment: XJ-192.175-top-all-cpu.png

XJ-192.175-top-all-cpu.png

Attachment: XJ-192.175-tsg_static_maat.txt

XJ-192.175-tsg_static_maat.txt

Attachment: XJ-192.175-tsg-maat.png

XJ-192.175-tsg-maat.png

Attachment: XXG-40.82-load-app-maat-all-cpu.png

XXG-40.82-load-app-maat-all-cpu.png

Attachment: XXG-40.82-load-app-maat-new-link.png

XXG-40.82-load-app-maat-new-link.png

Attachment: XXG-40.82-load-app-maat-perf-top-cpu14.png

XXG-40.82-load-app-maat-perf-top-cpu14.png

Attachment: XXG-40.82-load-app-maat-sysinfo.txt

XXG-40.82-load-app-maat-sysinfo.txt

Attachment: XXG-40.82-no-app-maat--all-cpu.png

XXG-40.82-no-app-maat--all-cpu.png

Attachment: XXG-40.82-no-app-maat-new-link.png

XXG-40.82-no-app-maat-new-link.png

Attachment: XXG-40.82-no-app-maat-perf-top-cpu14.png

XXG-40.82-no-app-maat-perf-top-cpu14.png

Attachment: XXG-40.82-no-app-maat-sysinfo.txt

XXG-40.82-no-app-maat-sysinfo.txt

Attachment: XXG-9140.sapp.bypass.png

XXG-9140.sapp.bypass.png

Attachment: 微信图片_20220426170327.png

微信图片_20220426170327.png

Attachment: 微信图片_20220426170336.png

微信图片_20220426170336.png

Attachment: 微信图片_20220426170342.png

微信图片_20220426170342.png

Attachment: 微信图片_20220426170353.png

微信图片_20220426170353.png

Attachment: 微信图片_20220426170400-1.png

微信图片_20220426170400-1.png

Attachment: 微信图片_20220426170415.png

微信图片_20220426170415.png

Attachment: 微信图片_20220426170429.png

微信图片_20220426170429.png

Attachment: 微信图片_20220426170433.png

微信图片_20220426170433.png

Attachment: 微信图片_20220426170438.png

微信图片_20220426170438.png

Attachment: 微信图片_20220426170442.png

微信图片_20220426170442.png

Attachment: 微信图片_20220426170446.png

微信图片_20220426170446.png