<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTP retransmission causing FW to modify packet in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FTP-retransmission-causing-FW-to-modify-packet/m-p/119487#M16895</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;We have put a FTP server behind a Security Gateway (R80.40) and this is causing the FTP scripts on the server to fail. It looks like a retransmission is happening with one FTP packets occasionally. The FW is altering this packet, which cause the FTP transfers to stop unexpectedly early.&lt;/P&gt;&lt;P&gt;I am using cppcap to capture the packets so the packets are seen 6 times as the traverse the firewall.&lt;/P&gt;&lt;P&gt;We see the original FTP response packet enter the firewall and pass correctly.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Packet1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11842i1FBE46CD01CFA218/image-size/large?v=v2&amp;amp;px=999" role="button" title="Packet1.png" alt="Packet1.png" /&gt;&lt;/span&gt;&amp;nbsp;after this packet there is a normal ACK back.&lt;/P&gt;&lt;P&gt;We then see a retransmission of this response packet enter the firewall.&amp;nbsp; We see this 3 times as it is inbound on the firewall:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Packet2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11843iDC0399FACA8400C8/image-size/large?v=v2&amp;amp;px=999" role="button" title="Packet2.png" alt="Packet2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When the packet starts on the outbound path it has dropped from 120 byte to 67 bytes, the TCP flags have changed and the FTP data has been truncated to be a single character (I believe it is a newline character)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Packet3.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11844i4353A4068F7386D2/image-size/large?v=v2&amp;amp;px=999" role="button" title="Packet3.png" alt="Packet3.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Something in the FW seems to process this retransmission in a strange way.&amp;nbsp; The FTP commands and the output are logged on the server and are checked by a script for the return FTP code 226. As is visible when we decode the FTP stream on a wireshark trace on the server, this modified packet with the newline causes the FTP return code to appear as "newline" + 26 instead of the expected FTP return code 226. This causing the FTP scripts to fail:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="decode.png" style="width: 405px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11845i68BFA059364196F7/image-size/large?v=v2&amp;amp;px=999" role="button" title="decode.png" alt="decode.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Has anyone experienced something like this before?&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;</description>
    <pubDate>Wed, 26 May 2021 16:10:48 GMT</pubDate>
    <dc:creator>Michael_Horne</dc:creator>
    <dc:date>2021-05-26T16:10:48Z</dc:date>
    <item>
      <title>FTP retransmission causing FW to modify packet</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FTP-retransmission-causing-FW-to-modify-packet/m-p/119487#M16895</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;We have put a FTP server behind a Security Gateway (R80.40) and this is causing the FTP scripts on the server to fail. It looks like a retransmission is happening with one FTP packets occasionally. The FW is altering this packet, which cause the FTP transfers to stop unexpectedly early.&lt;/P&gt;&lt;P&gt;I am using cppcap to capture the packets so the packets are seen 6 times as the traverse the firewall.&lt;/P&gt;&lt;P&gt;We see the original FTP response packet enter the firewall and pass correctly.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Packet1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11842i1FBE46CD01CFA218/image-size/large?v=v2&amp;amp;px=999" role="button" title="Packet1.png" alt="Packet1.png" /&gt;&lt;/span&gt;&amp;nbsp;after this packet there is a normal ACK back.&lt;/P&gt;&lt;P&gt;We then see a retransmission of this response packet enter the firewall.&amp;nbsp; We see this 3 times as it is inbound on the firewall:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Packet2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11843iDC0399FACA8400C8/image-size/large?v=v2&amp;amp;px=999" role="button" title="Packet2.png" alt="Packet2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When the packet starts on the outbound path it has dropped from 120 byte to 67 bytes, the TCP flags have changed and the FTP data has been truncated to be a single character (I believe it is a newline character)&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Packet3.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11844i4353A4068F7386D2/image-size/large?v=v2&amp;amp;px=999" role="button" title="Packet3.png" alt="Packet3.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Something in the FW seems to process this retransmission in a strange way.&amp;nbsp; The FTP commands and the output are logged on the server and are checked by a script for the return FTP code 226. As is visible when we decode the FTP stream on a wireshark trace on the server, this modified packet with the newline causes the FTP return code to appear as "newline" + 26 instead of the expected FTP return code 226. This causing the FTP scripts to fail:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="decode.png" style="width: 405px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/11845i68BFA059364196F7/image-size/large?v=v2&amp;amp;px=999" role="button" title="decode.png" alt="decode.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Has anyone experienced something like this before?&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 16:10:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FTP-retransmission-causing-FW-to-modify-packet/m-p/119487#M16895</guid>
      <dc:creator>Michael_Horne</dc:creator>
      <dc:date>2021-05-26T16:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTP retransmission causing FW to modify packet</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FTP-retransmission-causing-FW-to-modify-packet/m-p/119503#M16898</link>
      <description>&lt;P&gt;Yes I have although Wireshark does not seem to be showing a checksum error, check this SK:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk173191&amp;amp;partition=Advanced&amp;amp;product=IPS" target="_blank"&gt;sk173191: Packet data stripped by "TCP Invalid Checksum" IPS protection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Your issue also sounds vaguely similar to the following SK, but it does not match the symptoms exactly:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk24960&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;sk24960: "&lt;STRONG&gt;Smart&lt;/STRONG&gt; &lt;STRONG&gt;Connection&lt;/STRONG&gt; Reuse" feature modifies some SYN packets&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 18:49:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FTP-retransmission-causing-FW-to-modify-packet/m-p/119503#M16898</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-05-26T18:49:32Z</dc:date>
    </item>
    <item>
      <title>Re: FTP retransmission causing FW to modify packet</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FTP-retransmission-causing-FW-to-modify-packet/m-p/119543#M16904</link>
      <description>&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;Thanks for the links to the topics. I put in an exception for the "TCP invalid Checksum" protection for this particular connection, and I no longer see the FTP packets being truncated / changed as the pass through the firewall.&lt;/P&gt;</description>
      <pubDate>Thu, 27 May 2021 08:47:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/FTP-retransmission-causing-FW-to-modify-packet/m-p/119543#M16904</guid>
      <dc:creator>Michael_Horne</dc:creator>
      <dc:date>2021-05-27T08:47:45Z</dc:date>
    </item>
  </channel>
</rss>

