Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

PHP Timeout

We have the following issue .

Accessing an external web server for an application in PHP which has to create a PDF, from a selection made by the user ,and then provide the link to it , it fails by timing out

If we disable the proxy and the user goes through the firewall it then is successful

the PHP process takes 1 minute to generate the PDF and provide the link

If we make a smaller selection the process takes less and it goes through even with the proxy

 

Is there a way to increase such timeout ?

 

thanks



This thread was automatically locked due to age.
Parents
  • Stefano,

    are you using WAF rule to publish PHP webserver?

    Did you find something useful in the logs?

    Thanks

  • The Server is published externally by the application provider .

    The logs provided no help since the last line logged is the ...php page which is accepted .

  • Stefano,

    check the advanced-parameters from console using the command "show show advanced-firewall" and try to increate the tcp-est-idle-timeout using the command:

    set advanced-firewall tcp-est-idle-timeout "value in seconds"

    Regards

  • Here is the current values

            Strict Policy                           : on
            FtpBounce Prevention                    : control
            Tcp Conn. Establishment Idle Timeout    : 10800
            UDP Timeout Stream                      : 60
            Fragmented Traffic Policy               : allow
            Midstream Connection Pickup             : off
            TCP Seq Checking                        : on
            TCP Window Scaling                      : on
            TCP Appropriate Byte Count              : on
            TCP Selective Acknowledgements          : on
            TCP Forward RTO-Recovery[F-RTO]         : off
            TCP TIMESTAMPS                          : off
            Strict ICMP Tracking                    : off
            ICMP Error Message                      : allow
            IPv6 Unknown Extension Header           : deny

     

    the settings of UDP Streams is the only that looks close to the timeout we're experiencing

  • Hi StefanoColombo, 

    If you are using a DNAT rule , then you may take a tcpdump of the connection used to recreate this issue. 

    the command to monitor the traffic.

    console >drop 'host <src_ip>

    console>tcpdump 'host <src_ip>

    You may try disabling Strict policy and check if that reduces the delay and may need to toggle and check again.

    console >set advanced-firewall strict-policy off/on

    console> set advanced-firewall tcp-seq-checking off/on

  • What is the impact of disabling these ?

    console >set advanced-firewall strict-policy off/on

    console> set advanced-firewall tcp-seq-checking off/on

     

    what would you expect me to see from tcpdump , live ?

  • Stefano,

    from the XG CLI admin guide:

    • tcp-seq-checking

      Every TCP packet contains a Sequence Number (SYN) and an Acknowledgement Number (ACK). Sophos XG Firewall monitors SYN and ACK numbers within a certain window to ensure that the packet is indeed part of the session. However, certain application and third party vendors use non- RFC methods to verify a packet's validity or for some other reason a server may send packets in invalid sequence numbers and expect an acknowledgement. For this reason, Sophos Firewall offers the ability to disable this feature. Default – ON

    For strict policy, I am not sure what checks are disabled.

    From the TCPDUMP you should see wrong Sequence numbers, wrong ACK sequences or even RST flagged packet.

    Regards

Reply
  • Stefano,

    from the XG CLI admin guide:

    • tcp-seq-checking

      Every TCP packet contains a Sequence Number (SYN) and an Acknowledgement Number (ACK). Sophos XG Firewall monitors SYN and ACK numbers within a certain window to ensure that the packet is indeed part of the session. However, certain application and third party vendors use non- RFC methods to verify a packet's validity or for some other reason a server may send packets in invalid sequence numbers and expect an acknowledgement. For this reason, Sophos Firewall offers the ability to disable this feature. Default – ON

    For strict policy, I am not sure what checks are disabled.

    From the TCPDUMP you should see wrong Sequence numbers, wrong ACK sequences or even RST flagged packet.

    Regards

Children
No Data