You may know that every TCP/IP connection requires the use of "send buffers" and "receive buffers." These are simply 'holding pens', in which the TCP/IP stack stashes data; send buffers hold data from the application until it can be dispatched on the network, and receive buffers hold data received from the network until the application can retrieve it.
During the course of a TCP/IP connection--with every packet, in fact--each endpoint tells the other how much space it has left in its receive buffer; this lets the "other side" know how much more data it can send without waiting for ACKnowledgments. At this point, we refer to this "space available" as the TCP Window. So, if the default receive buffer starts at 64Kb, the endpoint has received 16Kb of data, and the application hasn't 'picked it up' yet, the TCP Window is 48Kb. If the application makes a pickup, the TCP Window will shoot right back up, only to drop again when the next round of data is received from the network. So, it's completely normal to see the TCP Windows (on both sides) ebb and flow during a conversation. Nothing to see here, right? Wrong.
What happens if an endpoint's receive buffer is filled and the application DOESN'T make a pickup in a timely fashion? Well, the TCP Window ("space available", remember?) drops to 0 and the TCP Zero Window condition arises. Think of this as "window closed." The other endpoint will STOP transmitting data, and will then begin a series of probes (usually at either 30-second or 1-minute intervals) to see if the recipient's TCP Window has opened. If the recipient should empty its receive buffers at all (in other words, the application makes even a partial pickup), it will announce the new "space available" with a TCP Window Update, acknowledging the last packet received; if not, it will continue to return TCP Zero Window information. So, to translate this into teenager-speak:
- Yadda yadda yadda (I got room for 18432 more)
- blah blah blah (I got room for 40 more)
- Yadda yadda yadda yadda yadda (I got room for 18418 more)
- blah blah blah (I got room for 11 more)
- Yadda yadda (I got room for 19235 more)
- SHUT UP! (no more room - window is closed = Zero Window)
- (1 minute later) Can I talk now? (I got room for 20183 more)
- NO! SHUT UP! (no more room - window is closed = Zero Window)
- (1 minute later) Can I talk now? (I got room for 65535 more <- his application has been picking up!)
- NO! SHUT UP! (no more room - window is closed = Zero Window)
- (Some seconds later) Ok, you can talk now... (I got room for 23482 more <- application finally made a partial pickup = TCP Window Update)
- Yadda yadda yadda...
Now, it isn't unusual to see Zero Window conditions that last for a second, or perhaps even 2 seconds; such things can be caused by traffic floods, CPU contention on the endpoint, and the like. If, however, you see Zero Window conditions lasting longer than 1-2 seconds, or if you see Zero Window conditions affecting multiple connections at the same time, you have a problem on your hands. Note that this is usually NOT a "network problem;" in most cases, the network is delivering data just fine. The problem is that the application (or some intermediate actor, like a VPN client or security software) is not picking the data up from the TCP/IP stack, so the local endpoint(s) put the other end(s) "on hold" until the matter is resolved.
I have seen Zero Window conditions that lasted for upwards of 10 minutes in production environments. Note that this is NOT a connection killer; as long as the Zero Window Probes are answered, the connection will remain alive as far as the application(s) are concerned. If you check the connection with netstat, it will show up as "ESTABLISHED," even though no application-layer data is flowing. This happens because the TCP stack is agnostic when it comes to actual data flow; as long as its housekeeping packets (such as keepalives or TCP Zero Window Probes) are answered normally, it's happy to maintain the connection. You won't "see" Zero Window conditions without capturing and analyzing the packet data.
Finding Zero Window conditions in network captures is not a difficult matter. With the Wireshark network analyzer, you can use the generic "tcp.analysis.flags" display filter; if you have a very large capture file, you can be more specific with the "tcp.analysis.zero_window" display filter. (You can also go to the menu and use Analyze->Expert Infos) Once you locate packets flagged with "[TCP Zero Window]" (as shown in the screenshot above), you can right-click on the packet and select "Follow TCP Stream" to see that particular conversation in context. Again, your Big Red Flags for problems above the network layer are Zero Window conditions lasting longer than 1-2 seconds and/or Zero Window conditions afffecting multiple connections at the same time.
Good hunting!
1 comment:
Very insightful - keep 'em coming.
Post a Comment