Date: Sat, 2 Nov 1996 17:55:15 PST From: Bill Fenner <fenner@parc.xerox.com> To: freebsd-bugs@freebsd.org, kent@lono.nosc.mil Cc: kobash@lono.nosc.mil, u651rc@emh.cpf.navy.mil Subject: Re: Illegal options in TCP header? Message-ID: <96Nov2.175518pst.177476@crevenia.parc.xerox.com>
next in thread | raw e-mail | index | archive | help
>I believe that FreeBSD is inserting illegal options in the TCP header >packets which it sends out during the session negotiation phase. >Shown below is a sniffer trace of the packets sent out by the >FreeBSD box to 198.22.146.10. Notice that it sends an unknown option >3 on the TCP header. TCP option number 3 is defined in RFC1323 (vintage 1992; perhaps your sniffer needs to be upgraded with newer software?). In any case, sending an unknown option does not necessarily make it illegal. The host is wrong to refuse the connection; RFC1122 (vintage 1989) says: 4.2.2.5 TCP Options: RFC-793 Section 3.1 A TCP MUST be able to receive a TCP option in any segment. A TCP MUST ignore without error any TCP option it does not implement, assuming that the option has a length field (all TCP options defined in the future will have length fields). TCP option number 3 has a length field; meaning that 198.22.146.10 MUST ignore it without error. If you want to turn off the RFC1323 extensions, you can set "tcp_extensions=NO" in /etc/sysconfig, but that's a kludge; the right solution is to get 198.22.146.10 to run an RFC-compliant TCP stack. Bill
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?96Nov2.175518pst.177476>