From owner-freebsd-hackers Tue Feb 4 03:19:45 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id DAA10653 for hackers-outgoing; Tue, 4 Feb 1997 03:19:45 -0800 (PST) Received: from root.com (implode.root.com [198.145.90.17]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id DAA10648 for ; Tue, 4 Feb 1997 03:19:40 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by root.com (8.7.6/8.6.5) with SMTP id DAA00348; Tue, 4 Feb 1997 03:17:20 -0800 (PST) Message-Id: <199702041117.DAA00348@root.com> X-Authentication-Warning: implode.root.com: Host localhost [127.0.0.1] didn't use HELO protocol To: proff@suburbia.net cc: hackers@freebsd.org, Richard Jones Subject: Re: linux net killer or no idea? (fwd) In-reply-to: Your message of "Tue, 04 Feb 1997 21:10:20 +1100." <19970204101020.12479.qmail@suburbia.net> From: David Greenman Reply-To: dg@root.com Date: Tue, 04 Feb 1997 03:17:20 -0800 Sender: owner-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk >I've just seen machines running linux/2.0.27, linux/2.1.24 and >freebsd/3.0-current freeze after downloading 144540 bytes of this >file: > > ftp://ftp.troll.no/contrib/xppp1B-x86-ELF.tar.gz This is a not-too-uncommon problem in the Internet that is caused by a faulty CSU/DSU or by a problem with the wire it is attached to. You'll find that there is a specific bit pattern that one of the hops involved can't deal with, and that bit pattern just happens to be present near offset 144540 in the above file. -DG David Greenman Core-team/Principal Architect, The FreeBSD Project