Date: Wed, 15 Nov 1995 12:53:45 +0100 (MET) From: Luigi Rizzo <luigi@labinfo.iet.unipi.it> To: joerg_wunsch@uriah.heep.sax.de Cc: peter@jhome.DIALix.COM, jgreco@brasil.moneng.mei.com, hackers@freebsd.org Subject: Re: if_mux hack? Message-ID: <199511151153.MAA03928@labinfo.iet.unipi.it> In-Reply-To: <199511150807.JAA05424@uriah.heep.sax.de> from "J Wunsch" at Nov 15, 95 09:06:57 am
next in thread | previous in thread | raw e-mail | index | archive | help
> As Peter Wemm wrote: > > > > extremely painful. :-( TCP is doing so much backoff that it's > > practically useless. (BTW: if there's an easy way to violate the RFC's > > by clamp the maximum TCP retransmission values I'd love to know...) > > Me too. :) I believe you can set the values in the tcp_backoff[] array to *low* values (i.e all '1') I did it, it works for a single host, I believe people would kill you if you start distributing a kernel with such a change :) Luigi ==================================================================== Luigi Rizzo Dip. di Ingegneria dell'Informazione email: luigi@iet.unipi.it Universita' di Pisa tel: +39-50-568533 via Diotisalvi 2, 56126 PISA (Italy) fax: +39-50-568522 http://www.iet.unipi.it/~luigi/ ====================================================================
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199511151153.MAA03928>