Hello All,
We have put a FTP server behind a Security Gateway (R80.40) and this is causing the FTP scripts on the server to fail. It looks like a retransmission is happening with one FTP packets occasionally. The FW is altering this packet, which cause the FTP transfers to stop unexpectedly early.
I am using cppcap to capture the packets so the packets are seen 6 times as the traverse the firewall.
We see the original FTP response packet enter the firewall and pass correctly.
after this packet there is a normal ACK back.
We then see a retransmission of this response packet enter the firewall. We see this 3 times as it is inbound on the firewall:
When the packet starts on the outbound path it has dropped from 120 byte to 67 bytes, the TCP flags have changed and the FTP data has been truncated to be a single character (I believe it is a newline character)
Something in the FW seems to process this retransmission in a strange way. The FTP commands and the output are logged on the server and are checked by a script for the return FTP code 226. As is visible when we decode the FTP stream on a wireshark trace on the server, this modified packet with the newline causes the FTP return code to appear as "newline" + 26 instead of the expected FTP return code 226. This causing the FTP scripts to fail:
Has anyone experienced something like this before?
Many thanks,
Michael