Date: Sun, 18 Nov 2018 14:56:08 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 219991] [PATCH] TCP process bogus packets with too large ACK Message-ID: <bug-219991-7501-pXI7kCqRsd@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-219991-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-219991-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=219991 Michael Tuexen <tuexen@freebsd.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |tuexen@freebsd.org --- Comment #1 from Michael Tuexen <tuexen@freebsd.org> --- Can you provide a .pcap file? Whether the reaction from the FreeBSD side is OK not not depends on SEG.SEQ of the received ACK segments. Unfortunately, tcpdump doesn't how SEG.SEQ for the ACK segments. Please note that https://tools.ietf.org/html/rfc793#section-3.9, page 69, specifies the conditions under which a received TCP segment is acceptable. If the received ACK is not acceptable (this depends on SEG.SEQ), an ACK as the one being sent has to be sent. So seeing the SEG.SEQ of the ACK segments is crucial here. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-219991-7501-pXI7kCqRsd>
