使用tcpdump测试反向代理和lvs的nat区别

关于反向代理,一个请求过来,实际反向代理服务器要和两个对象做3次握手

客户端到反向代理服务器,是一个3次握手

反向代理服务器请求后端web服务器,是一个3次握手

 

lvs的nat和反向代理不同。

lvs实际只修改数据包的目标地址,不做其它的操作。数据包的随机序列号seq等没变,实际还是客户端和后端web服务器做的3次握手

 

可以通过tcpdump抓取反向代理服务器的端口记录和后端web服务器的端口记录,看到一个请求过来之后,两个请求的seq是不一样的。

tcpdump 命令用法

-i 接网卡名 ,我这里网卡是是ens33,不是eth0,

port 接端口号 ,抓取哪个端口的数据

-vvv显示的信息多一点

查看抓取过程

可以看到Flag标志位,如果是S,表示syn。 序列号seq是个随机的值

 

 

接下来通过是研究证明,反向代理和后端web服务器,客户端和反向代理是2个3次握手

为了防止健康检查的干扰,把haproxy健康检查时间设置长一点,比如100秒,或者干脆取消健康检查

[root@linux-node1 ~]# vim /etc/haproxy/haproxy.cfg
[root@linux-node1 ~]# tail -3 /etc/haproxy/haproxy.cfg
   option httpchk  GET /index.html 
   balance  roundrobin
   server	linux-node2	10.0.1.106:8080	   check inter 100000 rise 3 fall 3 weight 1
[root@linux-node1 ~]# /etc/init.d/haproxy restart

然后客户端去访问http://10.0.1.105/test.js

 这样请求一定是发送到node2,因为反向代理做了规则设置,js为结尾的文件都指向了node2上

 

 抓取反向代理的80端口,看到seq是2964464279

[root@linux-node1 ~]# tcpdump -i ens33 port 80
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens33, link-type EN10MB (Ethernet), capture size 65535 bytes
02:39:39.219612 IP 10.0.1.72.56057 > linux-node1.example.com.http: Flags [S], seq 2964464279, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
02:39:39.219664 IP linux-node1.example.com.http > 10.0.1.72.56057: Flags [S.], seq 3532921320, ack 2964464280, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
02:39:39.221150 IP 10.0.1.72.56057 > linux-node1.example.com.http: Flags [.], ack 1, win 16425, length 0
02:39:39.221193 IP 10.0.1.72.56059 > linux-node1.example.com.http: Flags [S], seq 1955250633, win 8192, options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
02:39:39.221209 IP linux-node1.example.com.http > 10.0.1.72.56059: Flags [S.], seq 127908139, ack 1955250634, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
02:39:39.222792 IP 10.0.1.72.56059 > linux-node1.example.com.http: Flags [.], ack 1, win 16425, length 0
02:39:39.239383 IP 10.0.1.72.56057 > linux-node1.example.com.http: Flags [P.], seq 1:485, ack 1, win 16425, length 484
02:39:39.242443 IP linux-node1.example.com.http > 10.0.1.72.56057: Flags [P.], seq 1:123, ack 485, win 237, length 122
02:39:39.437364 IP 10.0.1.72.56057 > linux-node1.example.com.http: Flags [.], ack 123, win 16394, length 0
^C
9 packets captured
9 packets received by filter
0 packets dropped by kernel
[root@linux-node1 ~]# 

抓取后端web服务器的8080端口,看到seq是4209329376

[root@linux-node2 conf]# tcpdump -i ens33 port 8080 -vvv
tcpdump: listening on ens33, link-type EN10MB (Ethernet), capture size 65535 bytes
02:39:39.259521 IP (tos 0x0, ttl 64, id 35579, offset 0, flags [DF], proto TCP (6), length 60)
    10.0.1.105.52292 > linux-node2.example.com.webcache: Flags [S], cksum 0xaac9 (correct), seq 4209329376, win 29200, options [mss 1460,sackOK,TS val 446549531 ecr 0,nop,wscale 7], length 0
02:39:39.259574 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
    linux-node2.example.com.webcache > 10.0.1.105.52292: Flags [S.], cksum 0x1701 (incorrect -> 0xaaf9), seq 2283093898, ack 4209329377, win 28960, options [mss 1460,sackOK,TS val 446504562 ecr 446549531,nop,wscale 7], length 0
02:39:39.260064 IP (tos 0x0, ttl 64, id 35580, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.1.105.52292 > linux-node2.example.com.webcache: Flags [.], cksum 0x4a01 (correct), seq 1, ack 1, win 229, options [nop,nop,TS val 446549531 ecr 446504562], length 0
02:39:39.260236 IP (tos 0x0, ttl 64, id 35581, offset 0, flags [DF], proto TCP (6), length 534)
    10.0.1.105.52292 > linux-node2.example.com.webcache: Flags [P.], cksum 0xb821 (correct), seq 1:483, ack 1, win 229, options [nop,nop,TS val 446549532 ecr 446504562], length 482
02:39:39.260276 IP (tos 0x0, ttl 64, id 8696, offset 0, flags [DF], proto TCP (6), length 52)
    linux-node2.example.com.webcache > 10.0.1.105.52292: Flags [.], cksum 0x16f9 (incorrect -> 0x4817), seq 1, ack 483, win 235, options [nop,nop,TS val 446504563 ecr 446549532], length 0
02:39:39.260876 IP (tos 0x0, ttl 64, id 8697, offset 0, flags [DF], proto TCP (6), length 174)
    linux-node2.example.com.webcache > 10.0.1.105.52292: Flags [P.], cksum 0x1773 (incorrect -> 0x3575), seq 1:123, ack 483, win 235, options [nop,nop,TS val 446504564 ecr 446549532], length 122
02:39:39.261330 IP (tos 0x0, ttl 64, id 35582, offset 0, flags [DF], proto TCP (6), length 52)
    10.0.1.105.52292 > linux-node2.example.com.webcache: Flags [.], cksum 0x47a1 (correct), seq 483, ack 123, win 229, options [nop,nop,TS val 446549533 ecr 446504564], length 0
^C
7 packets captured
7 packets received by filter
0 packets dropped by kernel
[root@linux-node2 conf]# 

  

 

posted on 2019-03-01 14:36  nmap  阅读(942)  评论(0编辑  收藏  举报

导航