Closed blakelead closed 1 year ago
Are the AMIs responsible for it?
We don't have any reason to think this is related to the AMI; but let us know if this is still an issue on the latest AMI's or if you root-caused it.
Hi @blakelead,
So my questions are:
- What is the use for this option?
- Are the AMIs responsible for it?
- If so how can I get rid of it?
Did you finally find which component was causing the unknown TCP option to be added?
I have the same problem with an on premises cluster here.
@kanabeat unfortunately no.
After digging deeper into this, it appears that the TCP option is added by a security component in charge of threat detection/workload protection.
Traffic coming from pods inside one of our Kubernetes cluster have the following TCP frame:
The last TCP option is causing our on-premises Firewall receiving traffic from the pods to block the request containing this unknown (31) option.
This option is reserved by IANA's spec and should not be used: https://www.iana.org/assignments/tcp-parameters/tcp-parameters.xhtml#tcp-parameters-1
I tried multiple AMIs: ami-04b959013b0e014ca, ami-038341f2c72928ada, ami-00056da53ebd12c2e, ami-0bd4849feacfbb8a2 and I still get the same unknown option.
So my questions are:
Environment:
Linux ip-10-43-94-102.eu-west-1.compute.internal 5.4.95-42.163.amzn2.x86_64 #1 SMP Thu Feb 4 12:50:05 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux