Date: Sat, 2 Nov 1996 15:23:06 -1000 (HST) From: kent@lono.nosc.mil (Kent K. Kuriyama) To: freebsd-bugs@freebsd.org Cc: kent@lono.nosc.mil (Kent K. Kuriyama), u651rc@emh.cpf.navy.mil, kobash@lono.nosc.mil (Sidney H. Kobashigawa) Subject: Illegal options in TCP header? Message-ID: <9611030123.AA16199@lono.nosc.mil>
next in thread | raw e-mail | index | archive | help
I am running FreeBSD version 2.1.0.
I believe that FreeBSD is inserting illegal options in the TCP header
packets which it sends out during the session negotiation phase.
Shown below is a sniffer trace of the packets sent out by the
FreeBSD box to 198.22.146.10. Notice that it sends an unknown option
3 on the TCP header.
This causes the host at 198.22.146.10 to refuse the connection (frame
2). Now granted the host at 198.22.146.10 (system type unknown) is
the first one that refuses a connection from our FreeBSD's systems
but the sniffer trace also indicates that the FreeBSD system is sending
TCP headers with illegal options. I believe that 1 is the only valid
option defined.
As a basis for comparision of what other unix systems send I have
included a sucessfully session establishment from an Interactive
Unix box to the same host (frames 3 through 5).
Any insight into this problem would be greatly appreciated. Thank
you.
Kent Kuriyama
kent@nosc.mil
- - - - - - - - - - - - - - - - Frame 1 - - - - - - - - - - - - - - - - -
SUMMARY Delta T Destination Source Summary
M 1 [198.22.146.10] freebsd.cpf.n.. TCP D=25 S=1534 SYN SEQ=743819265 LEN=0 WIN=16384
TCP: ----- TCP header -----
TCP:
TCP: Source port = 1534
TCP: Destination port = 25 (SMTP)
TCP: Initial sequence number = 743819265
TCP: Data offset = 48 bytes
TCP: Flags = 02
TCP: ..0. .... = (No urgent pointer)
TCP: ...0 .... = (No acknowledgment)
TCP: .... 0... = (No push)
TCP: .... .0.. = (No reset)
TCP: .... ..1. = SYN
TCP: .... ...0 = (No FIN)
TCP: Window = 16384
TCP: Checksum = 80EE (correct)
TCP:
TCP: Options follow
TCP: Maximum segment size = 512
TCP: No-op
TCP: Unknown option 3
TCP: 22 byte(s) of header padding
TCP:
ADDR HEX ASCII
0000 00 00 0C F0 C1 04 00 00 4A 10 13 D4 08 00 45 10 ........J.....E.
0010 00 44 30 B4 00 00 40 06 73 66 C0 65 BE 03 C6 16 .D0...@.sf.e....
0020 92 0A 05 FE 00 19 2C 55 C8 01 00 00 00 00 C0 02 ......,U........
0030 40 00 80 EE 00 00 02 04 02 00 01 03 03 00 01 01 @...............
0040 08 0A 00 10 4D AC 00 00 00 00 01 01 0C 06 00 00 ....M...........
0050 42 0A B.
- - - - - - - - - - - - - - - - Frame 2 - - - - - - - - - - - - - - - - -
SUMMARY Delta T Destination Source Summary
2 0.3329 freebsd.cpf.n.. [198.22.146.10] TCP D=1534 S=25 RST ACK=743819266 WIN=4380
TCP: ----- TCP header -----
TCP:
TCP: Source port = 25 (SMTP)
TCP: Destination port = 1534
TCP: Sequence number = 0
TCP: Acknowledgment number = 743819266
Sniffer Network Analyzer data from 1-Nov-96 at 20:32:38, file C:\CAPTURE\SMTP.ENC, Page 2
TCP: Data offset = 20 bytes
TCP: Flags = 14
TCP: ..0. .... = (No urgent pointer)
TCP: ...1 .... = Acknowledgment
TCP: .... 0... = (No push)
TCP: .... .1.. = Reset
TCP: .... ..0. = (No SYN)
TCP: .... ...0 = (No FIN)
TCP: Window = 4380
TCP: Checksum = CDBB (correct)
TCP: No TCP options
TCP:
ADDR HEX ASCII
0000 00 00 4A 10 13 D4 00 00 0C F0 C1 04 08 00 45 00 ..J...........E.
0010 00 28 65 5D 00 00 35 06 49 E9 C6 16 92 0A C0 65 .(e]..5.I......e
0020 BE 03 00 19 05 FE 00 00 00 00 2C 55 C8 02 50 14 ..........,U..P.
0030 11 1C CD BB 00 00 00 00 00 00 00 00 ............
- - - - - - - - - - - - - - - - Frame 3 - - - - - - - - - - - - - - - - -
SUMMARY Delta T Destination Source Summary
3 31.2447 [198.22.146.10] unix.cpf.navy.. TCP D=25 S=1029 SYN SEQ=659147265 LEN=0 WIN=4096
TCP: ----- TCP header -----
TCP:
TCP: Source port = 1029
TCP: Destination port = 25 (SMTP)
TCP: Initial sequence number = 659147265
TCP: Data offset = 20 bytes
TCP: Flags = 02
TCP: ..0. .... = (No urgent pointer)
TCP: ...0 .... = (No acknowledgment)
TCP: .... 0... = (No push)
TCP: .... .0.. = (No reset)
TCP: .... ..1. = SYN
TCP: .... ...0 = (No FIN)
TCP: Window = 4096
TCP: Checksum = D3E9 (correct)
TCP: No TCP options
TCP:
ADDR HEX ASCII
0000 00 00 0C F0 C1 04 00 00 4A 10 1A 6E 08 00 45 00 ........J..n..E.
0010 00 28 2A 66 00 00 40 06 79 DA C0 65 BE 09 C6 16 .(*f..@.y..e....
0020 92 0A 04 05 00 19 27 49 CA 01 00 00 00 00 50 02 ......'I......P.
0030 10 00 D3 E9 00 00 05 79 6F 6B 31 30 .......yok10
- - - - - - - - - - - - - - - - Frame 4 - - - - - - - - - - - - - - - - -
Sniffer Network Analyzer data from 1-Nov-96 at 20:32:38, file C:\CAPTURE\SMTP.ENC, Page 3
SUMMARY Delta T Destination Source Summary
4 0.4323 unix.cpf.navy.. [198.22.146.10] TCP D=1029 S=25 SYN ACK=659147266 SEQ=4980388 LEN=0 WIN=0
TCP: ----- TCP header -----
TCP:
TCP: Source port = 25 (SMTP)
TCP: Destination port = 1029
TCP: Initial sequence number = 4980388
TCP: Acknowledgment number = 659147266
TCP: Data offset = 24 bytes
TCP: Flags = 12
TCP: ..0. .... = (No urgent pointer)
TCP: ...1 .... = Acknowledgment
TCP: .... 0... = (No push)
TCP: .... .0.. = (No reset)
TCP: .... ..1. = SYN
TCP: .... ...0 = (No FIN)
TCP: Window = 0
TCP: Checksum = D0E0 (correct)
TCP:
TCP: Options follow
TCP: Maximum segment size = 512
TCP:
ADDR HEX ASCII
0000 00 00 4A 10 1A 6E 00 00 0C F0 C1 04 08 00 45 00 ..J..n........E.
0010 00 2C 65 67 00 00 35 06 49 D5 C6 16 92 0A C0 65 .,eg..5.I......e
0020 BE 09 00 19 04 05 00 4B FE A4 27 49 CA 02 60 12 .......K..'I..`.
0030 00 00 D0 E0 00 00 02 04 02 00 ED AF ............
- - - - - - - - - - - - - - - - Frame 5 - - - - - - - - - - - - - - - - -
SUMMARY Delta T Destination Source Summary
5 0.0019 [198.22.146.10] unix.cpf.navy.. TCP D=25 S=1029 ACK=4980389 WIN=4096
TCP: ----- TCP header -----
TCP:
TCP: Source port = 1029
TCP: Destination port = 25 (SMTP)
TCP: Sequence number = 659147266
TCP: Acknowledgment number = 4980389
TCP: Data offset = 20 bytes
TCP: Flags = 10
TCP: ..0. .... = (No urgent pointer)
TCP: ...1 .... = Acknowledgment
TCP: .... 0... = (No push)
TCP: .... .0.. = (No reset)
TCP: .... ..0. = (No SYN)
TCP: .... ...0 = (No FIN)
Sniffer Network Analyzer data from 1-Nov-96 at 20:32:38, file C:\CAPTURE\SMTP.ENC, Page 4
TCP: Window = 4096
TCP: Checksum = D4E9 (correct)
TCP: No TCP options
TCP:
ADDR HEX ASCII
0000 00 00 0C F0 C1 04 00 00 4A 10 1A 6E 08 00 45 00 ........J..n..E.
0010 00 28 2A 68 00 00 40 06 79 D8 C0 65 BE 09 C6 16 .(*h..@.y..e....
0020 92 0A 04 05 00 19 27 49 CA 02 00 4B FE A5 50 10 ......'I...K..P.
0030 10 00 D4 E9 00 00 54 72 79 69 6E 67 ......Trying
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9611030123.AA16199>
