This topic is closed to replies but I experience the very same behaviour.
If I start relay with -network-timeout
anything larger than 2 minutes, it is ignored and I get the EOF error like the previous OP got (2024/09/12 16:08:10 listener.go:232: Closing connection N74QTL7-GVVDDQK-OPTDSXQ-DEGHCK7-ZB7VPOS-ZIKWZJ5-5WKHG3L-2SGOVAK: EOF
)
If I make it less than 2 minutes, it ends the connection with a different message (2024/09/12 15:30:51 listener.go:232: Closing connection N74QTL7-GVVDDQK-OPTDSXQ-DEGHCK7-ZB7VPOS-ZIKWZJ5-5WKHG3L-2SGOVAK: read tcp 10.x.x.x:22067->10.y.y.y:39044: use of closed network connection
)
tcpdump
ran on the linux host running the strelay show evidence that strelaysrv is voluntarily ending the tcp session, it is not a firewall/networking root cause; also right after line 232 in listener.go there is an explicit conn.Close()
Establishing manual netcat tcp connections over the same 22067 port remain open.
It behaves as if somewhere there has remain a hardcoded value of 2 minutes that appears to ignore the value from command line.
15:52:42.357624 IP 10.y.y.y.39528 > 10.x.x.x.22067: Flags [.], ack 1, win 251, options [nop,nop,TS val 848512897 ecr 2745209779], length 0
15:52:42.357711 IP 10.x.x.x.22067 > 10.y.y.y.39528: Flags [.], ack 1, win 503, options [nop,nop,TS val 2745224997 ecr 848498016], length 0
15:52:42.395025 IP 10.x.x.x.22067 > 10.y.y.y.39528: Flags [.], ack 1, win 503, options [nop,nop,TS val 2745225034 ecr 848498016], length 0
15:52:42.676215 IP 10.y.y.y.39528 > 10.x.x.x.22067: Flags [.], ack 1, win 251, options [nop,nop,TS val 848513229 ecr 2745224997], length 0
15:52:57.483064 IP 10.y.y.y.39528 > 10.x.x.x.22067: Flags [.], ack 1, win 251, options [nop,nop,TS val 848528189 ecr 2745224997], length 0
15:52:57.483103 IP 10.x.x.x.22067 > 10.y.y.y.39528: Flags [.], ack 1, win 503, options [nop,nop,TS val 2745240122 ecr 848513229], length 0
15:52:57.754959 IP 10.x.x.x.22067 > 10.y.y.y.39528: Flags [.], ack 1, win 503, options [nop,nop,TS val 2745240394 ecr 848513229], length 0
15:52:57.794872 IP 10.y.y.y.39528 > 10.x.x.x.22067: Flags [.], ack 1, win 251, options [nop,nop,TS val 848528510 ecr 2745240122], length 0
15:53:09.937007 IP 10.y.y.y.39528 > 10.x.x.x.22067: Flags [P.], seq 1:25, ack 1, win 251, options [nop,nop,TS val 848540648 ecr 2745240122], length 24
15:53:09.937115 IP 10.x.x.x.22067 > 10.y.y.y.39528: Flags [.], ack 25, win 503, options [nop,nop,TS val 2745252576 ecr 848540648], length 0
15:53:09.937388 IP 10.x.x.x.22067 > 10.y.y.y.39528: Flags [P.], seq 1:25, ack 25, win 503, options [nop,nop,TS val 2745252577 ecr 848540648], length 24
15:53:09.937421 IP 10.x.x.x.22067 > 10.y.y.y.39528: Flags [F.], seq 25, ack 25, win 503, options [nop,nop,TS val 2745252577 ecr 848540648], length 0
15:53:09.942953 IP 10.y.y.y.39528 > 10.x.x.x.22067: Flags [F.], seq 25, ack 1, win 251, options [nop,nop,TS val 848540648 ecr 2745240122], length 0
15:53:09.943040 IP 10.x.x.x.22067 > 10.y.y.y.39528: Flags [.], ack 26, win 503, options [nop,nop,TS val 2745252582 ecr 848540648], length 0
15:53:09.948969 IP 10.y.y.y.39534 > 10.x.x.x.22067: Flags [S], seq 1876806255, win 29200, options [mss 1205,sackOK,TS val 848540649 ecr 0,nop,wscale 7], length 0
15:53:09.949085 IP 10.x.x.x.22067 > 10.y.y.y.39534: Flags [S.], seq 3420800168, ack 1876806256, win 64422, options [mss 1205,sackOK,TS val 2745252588 ecr 848540649,nop,wscale 7], length 0
15:53:09.989130 IP 10.y.y.y.39528 > 10.x.x.x.22067: Flags [R], seq 2494221642, win 0, length 0