<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TCP fast open and Palo Alto in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-fast-open-and-palo-alto/m-p/586894#M117114</link>
    <description>&lt;P&gt;filed a support case (&lt;SPAN&gt;03048840)&lt;/SPAN&gt;. With some extra details:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This should be trivial to reproduce but here are some details:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I am reproducing using curl:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;curl --tcp-fastopen 10.224.123.2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;curl --tcp-fastopen 10.224.123.2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;the capture from server side:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;07:52:38.824058 IP 192.168.254.1.33362 &amp;gt; 10.224.123.2.http: Flags [S], seq 1997538034:1997538110, win 32120, options [mss 1460,sackOK,TS val 2596799303 ecr 0,nop,wscale 7,tfo cookie feaf99536833786f,nop,nop], length 76: HTTP: GET / HTTP/1.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;----------- this is a syn with data and a valid tfo cookie. It is transmitted no matter the zone protection profile.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;07:52:38.824094 IP 10.224.123.2.http &amp;gt; 192.168.254.1.33362: Flags [S.], seq 3691388850, ack 1997538111, win 31856, options [mss 1460,sackOK,TS val 684199578 ecr 2596799303,nop,wscale 7], length 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;---------- this is the syn ack from the server. My server does not push data but it acknowledges the data received (ack=1997538111)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;07:52:38.824877 IP 10.224.123.2.http &amp;gt; 192.168.254.1.33362: Flags [P.], seq 1:413, ack 1, win 249, options [nop,nop,TS val 684199578 ecr 2596799303], length 412: HTTP: HTTP/1.1 200 OK&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;07:52:39.870373 IP 10.224.123.2.http &amp;gt; 192.168.254.1.33362: Flags [S.], seq 3691388850, ack 1997538111, win 31856, options [mss 1460,sackOK,TS val 684200624 ecr 2596799303,nop,wscale 7], length 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;------- server keeps replying and always acknowledging the sent data (ack=1997538111)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;07:52:41.918347 IP 10.224.123.2.http &amp;gt; 192.168.254.1.33362: Flags [S.], seq 3691388850, ack 1997538111, win 31856, options [mss 1460,sackOK,TS val 684202672 ecr 2596799303,nop,wscale 7], length 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;^C&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;from Palo Alto debug logs, the SYN-ACK is dropped because of TCP reassembly&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;== 2024-05-16 07:51:17.330 +0200 ==&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Packet received at fastpath stage, tag 25, type ATOMIC&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Packet info: len 74 port 17 interface 17 vsys 1 TC 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;wqe index 17336 packet 0x0xd022401100, HA: 0, IC: 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Packet decoded dump:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;L2: 00:15:5d:34:31:21-&amp;gt;00:15:5d:34:31:22, type 0x0800&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;IP: 10.224.123.2-&amp;gt;192.168.254.1, protocol 6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;version 4, ihl 5, tos 0x00, len 60,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;id 0, frag_off 0x4000, ttl 64, checksum 12278(0xf62f)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;TCP: sport 80, dport 33362, seq 3691388850, ack 1997538111,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;reserved 0, offset 10, window 31856, checksum 47318,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;flags 0x12 ( SYN ACK), urgent data 0, l4 data len 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;TCP option:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;00000000: 02 04 05 b4 04 02 08 0a 28 c8 0e 9a 9a c8 03 47 ........ (......G&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;00000010: 01 03 03 07 ....&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Flow fastpath, session 25 s2c (set work 0xd021414d00 exclude_video 0 from sp 0xd03417f480 exclude_video 0)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;IP checksum valid&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;* Dos Profile NULL (NO) Index (0/0) *&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2024-05-16 07:51:17.330 +0200 debug: pan_tcp_reass(pan_reass.c:3253): REASS: arg.seqno=3691388850 wqe-id=17336&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2024-05-16 07:51:17.330 +0200 debug: pan_tcp_reass(pan_reass.c:3265): REASS: work 0xd021414d00 session=25 seqno=3691388850 ackno=1997538111 tcplen=0 l4plen=0 flags 0x12 s2c state 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2024-05-16 07:51:17.330 +0200 debug: pan_tcp_reass(pan_reass.c:3803):&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;session=25 work 0xd021414d00 payload len 0, tcp data len 0, ret 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;TCP reassembly failed: ret 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Another reproducer, this time using a publicly available server supporting TCP fast open&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;$ sysctl net.ipv4.tcp_fastopen net.ipv4.tcp_fastopen_blackhole_timeout_sec&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;net.ipv4.tcp_fastopen = 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;net.ipv4.tcp_fastopen_blackhole_timeout_sec = 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;$ curl --tcp-fastopen&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://ocsp.usertrust.com/" target="_blank" rel="noopener"&gt;ocsp.usertrust.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;^C&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;$ curl --tcp-fastopen&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://ocsp.usertrust.com/" target="_blank" rel="noopener"&gt;ocsp.usertrust.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;^C&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;$ curl --tcp-fastopen&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://ocsp.usertrust.com/" target="_blank" rel="noopener"&gt;ocsp.usertrust.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;^C&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 16 May 2024 06:23:20 GMT</pubDate>
    <dc:creator>frigault</dc:creator>
    <dc:date>2024-05-16T06:23:20Z</dc:date>
    <item>
      <title>TCP fast open and Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-fast-open-and-palo-alto/m-p/586608#M117070</link>
      <description>&lt;P&gt;as far as I could test there is no way to make TCP fast open work through a Palo Alto fw (at least, since&amp;nbsp; 9.1 which seemed to work. It tried 10.2 and 11.2 and all my tests fail there).&lt;/P&gt;
&lt;P&gt;Whenever a client sends a SYN packet with data, it is transmitted, no matter the zone protection profile, no matter whether the "&lt;SPAN&gt;TCP SYN with Data" option in the zone profile is checked or not.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When the server replies a SYN-ACK acknowledging data, the fw drops the packet (and logs a "TCP reassembly failed: ret 2" in the debug logs).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The only workaround is to set the "strip TCP option &amp;gt; TCP fast open", entirely deactivating TCP fast open.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Has this regression been reported yet?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 09:01:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-fast-open-and-palo-alto/m-p/586608#M117070</guid>
      <dc:creator>frigault</dc:creator>
      <dc:date>2024-05-14T09:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: TCP fast open and Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-fast-open-and-palo-alto/m-p/586820#M117106</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/285447"&gt;@frigault&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would recommend creating a support ticket and sharing your findings as this has&amp;nbsp;&lt;SPAN&gt;not specifically been addressed in recent updates.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 17:24:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-fast-open-and-palo-alto/m-p/586820#M117106</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-05-15T17:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: TCP fast open and Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-fast-open-and-palo-alto/m-p/586894#M117114</link>
      <description>&lt;P&gt;filed a support case (&lt;SPAN&gt;03048840)&lt;/SPAN&gt;. With some extra details:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This should be trivial to reproduce but here are some details:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I am reproducing using curl:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;curl --tcp-fastopen 10.224.123.2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;curl --tcp-fastopen 10.224.123.2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;the capture from server side:&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;07:52:38.824058 IP 192.168.254.1.33362 &amp;gt; 10.224.123.2.http: Flags [S], seq 1997538034:1997538110, win 32120, options [mss 1460,sackOK,TS val 2596799303 ecr 0,nop,wscale 7,tfo cookie feaf99536833786f,nop,nop], length 76: HTTP: GET / HTTP/1.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;----------- this is a syn with data and a valid tfo cookie. It is transmitted no matter the zone protection profile.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;07:52:38.824094 IP 10.224.123.2.http &amp;gt; 192.168.254.1.33362: Flags [S.], seq 3691388850, ack 1997538111, win 31856, options [mss 1460,sackOK,TS val 684199578 ecr 2596799303,nop,wscale 7], length 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;---------- this is the syn ack from the server. My server does not push data but it acknowledges the data received (ack=1997538111)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;07:52:38.824877 IP 10.224.123.2.http &amp;gt; 192.168.254.1.33362: Flags [P.], seq 1:413, ack 1, win 249, options [nop,nop,TS val 684199578 ecr 2596799303], length 412: HTTP: HTTP/1.1 200 OK&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;07:52:39.870373 IP 10.224.123.2.http &amp;gt; 192.168.254.1.33362: Flags [S.], seq 3691388850, ack 1997538111, win 31856, options [mss 1460,sackOK,TS val 684200624 ecr 2596799303,nop,wscale 7], length 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;------- server keeps replying and always acknowledging the sent data (ack=1997538111)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;07:52:41.918347 IP 10.224.123.2.http &amp;gt; 192.168.254.1.33362: Flags [S.], seq 3691388850, ack 1997538111, win 31856, options [mss 1460,sackOK,TS val 684202672 ecr 2596799303,nop,wscale 7], length 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;^C&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;from Palo Alto debug logs, the SYN-ACK is dropped because of TCP reassembly&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;== 2024-05-16 07:51:17.330 +0200 ==&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Packet received at fastpath stage, tag 25, type ATOMIC&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Packet info: len 74 port 17 interface 17 vsys 1 TC 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;wqe index 17336 packet 0x0xd022401100, HA: 0, IC: 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Packet decoded dump:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;L2: 00:15:5d:34:31:21-&amp;gt;00:15:5d:34:31:22, type 0x0800&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;IP: 10.224.123.2-&amp;gt;192.168.254.1, protocol 6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;version 4, ihl 5, tos 0x00, len 60,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;id 0, frag_off 0x4000, ttl 64, checksum 12278(0xf62f)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;TCP: sport 80, dport 33362, seq 3691388850, ack 1997538111,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;reserved 0, offset 10, window 31856, checksum 47318,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;flags 0x12 ( SYN ACK), urgent data 0, l4 data len 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;TCP option:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;00000000: 02 04 05 b4 04 02 08 0a 28 c8 0e 9a 9a c8 03 47 ........ (......G&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;00000010: 01 03 03 07 ....&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Flow fastpath, session 25 s2c (set work 0xd021414d00 exclude_video 0 from sp 0xd03417f480 exclude_video 0)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;IP checksum valid&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;* Dos Profile NULL (NO) Index (0/0) *&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2024-05-16 07:51:17.330 +0200 debug: pan_tcp_reass(pan_reass.c:3253): REASS: arg.seqno=3691388850 wqe-id=17336&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2024-05-16 07:51:17.330 +0200 debug: pan_tcp_reass(pan_reass.c:3265): REASS: work 0xd021414d00 session=25 seqno=3691388850 ackno=1997538111 tcplen=0 l4plen=0 flags 0x12 s2c state 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2024-05-16 07:51:17.330 +0200 debug: pan_tcp_reass(pan_reass.c:3803):&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;session=25 work 0xd021414d00 payload len 0, tcp data len 0, ret 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;TCP reassembly failed: ret 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Another reproducer, this time using a publicly available server supporting TCP fast open&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;$ sysctl net.ipv4.tcp_fastopen net.ipv4.tcp_fastopen_blackhole_timeout_sec&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;net.ipv4.tcp_fastopen = 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;net.ipv4.tcp_fastopen_blackhole_timeout_sec = 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;$ curl --tcp-fastopen&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://ocsp.usertrust.com/" target="_blank" rel="noopener"&gt;ocsp.usertrust.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;^C&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;$ curl --tcp-fastopen&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://ocsp.usertrust.com/" target="_blank" rel="noopener"&gt;ocsp.usertrust.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;^C&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;$ curl --tcp-fastopen&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://ocsp.usertrust.com/" target="_blank" rel="noopener"&gt;ocsp.usertrust.com&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;^C&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 06:23:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-fast-open-and-palo-alto/m-p/586894#M117114</guid>
      <dc:creator>frigault</dc:creator>
      <dc:date>2024-05-16T06:23:20Z</dc:date>
    </item>
    <item>
      <title>Re: TCP fast open and Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-fast-open-and-palo-alto/m-p/1224936#M123798</link>
      <description>&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-2/pan-os-release-notes/pan-os-11-2-5-known-and-addressed-issues/pan-os-11-2-5-addressed-issues" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/11-2/pan-os-release-notes/pan-os-11-2-5-known-and-addressed-issues/pan-os-11-2-5-addressed-issues&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;mentions&lt;/P&gt;
&lt;TABLE class="table colsep rowsep  table-striped"&gt;
&lt;TBODY class="tbody"&gt;
&lt;TR class="row rowsep"&gt;
&lt;TD class="entry"&gt;
&lt;DIV class="p"&gt;&lt;STRONG class="ph b"&gt;PAN-258149&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD class="entry relcol"&gt;
&lt;DIV class="p"&gt;Fixed an issue where the firewall dropped the SYN-ACK when using the TCP Fast Open option.&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;from my tests it seems the issue is fixed in this version.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 18:46:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-fast-open-and-palo-alto/m-p/1224936#M123798</guid>
      <dc:creator>frigault</dc:creator>
      <dc:date>2025-03-27T18:46:13Z</dc:date>
    </item>
  </channel>
</rss>

