Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 18 Nov 2018 14:56:08 +0000
From:      bugzilla-noreply@freebsd.org
To:        net@FreeBSD.org
Subject:   [Bug 219991] [PATCH] TCP process bogus packets with too large ACK
Message-ID:  <bug-219991-7501-pXI7kCqRsd@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-219991-7501@https.bugs.freebsd.org/bugzilla/>
References:  <bug-219991-7501@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=219991

Michael Tuexen <tuexen@freebsd.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |tuexen@freebsd.org

--- Comment #1 from Michael Tuexen <tuexen@freebsd.org> ---
Can you provide a .pcap file? Whether the reaction from the FreeBSD side is OK
not not depends on SEG.SEQ of the received ACK segments. Unfortunately, tcpdump
doesn't how SEG.SEQ for the ACK segments.

Please note that https://tools.ietf.org/html/rfc793#section-3.9, page 69,
specifies the conditions under which a received TCP segment is acceptable. If
the received ACK is not acceptable (this depends on SEG.SEQ), an ACK as the one
being sent has to be sent.

So seeing the SEG.SEQ of the ACK segments is crucial here.

-- 
You are receiving this mail because:
You are the assignee for the bug.


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-219991-7501-pXI7kCqRsd>