Date: Sun, 8 Feb 2015 15:59:28 +0100 From: Simone Lombardo <evil.lombo@gmail.com> To: Adrian Chadd <adrian@freebsd.org> Cc: FreeBSD Questions <freebsd-questions@freebsd.org> Subject: Re: HTTPS/TLS issue on a NDIS wrapped NIC Message-ID: <CALnnSEhKJv67sYb%2B_VXV0COfLYhtAgNZsy_fGM6PJHsAhCeQ=g@mail.gmail.com> In-Reply-To: <CAJ-Vmon=UzYCqrTAS0C_CSB4sBnsU13TTWae5Wkxvhm01Aoozw@mail.gmail.com> References: <CALnnSEivExhv=v5jJ3xxFmJANCQs9Y%2BB7LFyEPeA1wtjk1zJwA@mail.gmail.com> <CAJ-Vmo=ggjvGPYqN5QS-cYF5zdLHMZixp7xXunDCE3s8xp2fmQ@mail.gmail.com> <CAJ-Vmon=UzYCqrTAS0C_CSB4sBnsU13TTWae5Wkxvhm01Aoozw@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi Adrian, thanks for the reply. I have not seen other side effect other than cited ones. it works fine also with various P2P and FTP protocols for instance. I have probed the interface with netstat -id but the dropped and error packet counters sign 0, so it doesn't seem explicity droppped by the if_ndis module. I guess further investigations requires a demo web server to check if it is the remote peer to discard packets or the nic is falsely reporting their transmission. Is there any sysctl or debug feature you know to check if it discarded by the local upper layers? Thanks, Simone 2015-02-07 17:30 GMT+01:00 Adrian Chadd <adrian@freebsd.org>: > .. or if that isn't breaking things, maybe there's some packet > corruption going on that triggers encryption failures? Normally a > corrupted packet would just be dropped by some part of the stack. > > > -adrian >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CALnnSEhKJv67sYb%2B_VXV0COfLYhtAgNZsy_fGM6PJHsAhCeQ=g>