views:

799

answers:

4

Let's assume there is a client that makes a lot of short-living connections to a server.

If the client closes the connection, there will be many ports in TIME_WAIT state on the client side. Since the client runs out of local ports, it becomes impossible to make a new connection attempt quickly.

If the server closes the connection, I will see many TIME_WAITs on the server side. However, does this do any harm? The client (or other clients) can keep making connection attempts since it never runs out of local ports, and the number of TIME_WAIT state will increase on the server side. What happens eventually? Does something bad happen? (slowdown, crash, dropped connections, ..)

Please note that my question is not 'what is the purpose of TIME_WAIT?' but 'what happens if there are so many TIME_WAIT states on the server?' I already know what happens when a connection is closed in TCP/IP and why TIME_WAIT state is required. :) I'm not trying to trouble-shoot it but just want to know what is the potential issue with it.

To put simply, let's say 'netstat -nat | grep :8080 | grep TIME_WAIT | wc -l' prints '100000'. What would happen? Does the O/S network stack slow down? Too many open files error? Or, just nothing to worry about?

A: 

it looks like the server can just run out of ports to assign for incoming connections (for the duration of existing TIMED_WAITs) - a case for a DOS attack.

catwalk
Why does the server run out of ports? Server does not allocate a local port for an accepted connection. That's why a server can handle 100k concurrent connection, putting the busy CPU problem aside.
Trustin Lee
The does does allocate a local port for accepted connections, run a 'netstat -a' from a command prompt and you will see these. I believe the reason for TIME_WAIT is that TCP packets can arrive in the wrong order, so the port must not be closed immediately to allow late packets to arrive. This means it is, indeed, possible to run out of ports. There are ways to shorten the TIME_WAIT period but the risk is that with shorter timeouts then late arriving packets from a previous connection can be mistaken for packets from the new connection on the recycled port.
Paul Ruane
If you run 'netstat -nat', you will see the connections accepted by the same server socket have the same local port. Hence I guess no extra local ports are assigned for accepted connections?
Trustin Lee
Also, if the server allocates a local port, the server should not be able to accept more than 64k concurrent connections. However, that is not true.
Trustin Lee
@Trustin Lee: turns out you are right - a tcp connection in uniquely identified by a 4-tuple (server address, server port, client address, client port) so port exhaustion will apply only to a (pretty contrived) case when client ip and port are the same for all connections.
catwalk
+2  A: 

Findings so far:

Even if the server closed the socket using system call, its file descriptor will not be released if it enters the TIME_WAIT state. The file descriptor will be released later when the TIME_WAIT state is gone (i.e. after 2*MSL seconds). Therefore, too many TIME_WAITs will possibly lead to 'too many open files' error in the server process.

I believe O/S TCP/IP stack has been implemented with proper data structure (e.g. hash table), so the total number of TIME_WAITs should not affect the performance of the O/S TCP/IP stack. Only the process (server) which owns the sockets in TIME_WAIT state will suffer.

Trustin Lee
+1  A: 

Each connection is identified by a tuple (server IP, server port, client IP, client port). Crucially, the TIME_WAIT connections (whether they are on the server side or on the client side) each occupy one of these tuples.

With the TIME_WAITs on the client side, it's easy to see why you can't make any more connections - you have no more local ports. However, the same issue applies on the server side - once it has 64k connections in TIME_WAIT state for a single client, it can't accept any more connections from that client, because it has no way to tell the difference between the old connection and the new connection - both connections are identified by the same tuple. The server should just send back RSTs to new connection attempts from that client in this case.

caf
+1  A: 

Each socket in TIME_WAIT consumes some memory in the kernel, usually somewhat less than an ESTABLISHED socket yet still significant. A sufficiently large number could exhaust kernel memory, or at least degrade performance because that memory could be used for other purposes. TIME_WAIT sockets do not hold open file descriptors (assuming they have been closed properly), so you should not need to worry about a "too many open files" error.

The socket also ties up that particular src/dst IP address and port so it cannot be reused for the duration of the TIME_WAIT interval. (This is the intended purpose of the TIME_WAIT state.) Tying up the port is not usually an issue unless you need to reconnect a with the same port pair. Most often one side will use an ephemeral port, with only one side anchored to a well known port. However, a very large number of TIME_WAIT sockets can exhaust the ephemeral port space if you are repeatedly and frequently connecting between the same two IP addresses. Note this only affects this particular IP address pair, and will not affect establishment of connections with other hosts.

John Heffner