From owner-freebsd-hackers Wed Nov 15 04:10:47 1995 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id EAA24345 for hackers-outgoing; Wed, 15 Nov 1995 04:10:47 -0800 Received: from labinfo.iet.unipi.it (labinfo.iet.unipi.it [131.114.9.5]) by freefall.freebsd.org (8.6.12/8.6.6) with ESMTP id EAA24294 for ; Wed, 15 Nov 1995 04:09:31 -0800 Received: from localhost (luigi@localhost) by labinfo.iet.unipi.it (8.6.5/8.6.5) id MAA03928; Wed, 15 Nov 1995 12:53:45 +0100 From: Luigi Rizzo Message-Id: <199511151153.MAA03928@labinfo.iet.unipi.it> Subject: Re: if_mux hack? To: joerg_wunsch@uriah.heep.sax.de Date: Wed, 15 Nov 1995 12:53:45 +0100 (MET) Cc: peter@jhome.DIALix.COM, jgreco@brasil.moneng.mei.com, hackers@freebsd.org In-Reply-To: <199511150807.JAA05424@uriah.heep.sax.de> from "J Wunsch" at Nov 15, 95 09:06:57 am X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 881 Sender: owner-hackers@freebsd.org Precedence: bulk > As Peter Wemm wrote: > > > > extremely painful. :-( TCP is doing so much backoff that it's > > practically useless. (BTW: if there's an easy way to violate the RFC's > > by clamp the maximum TCP retransmission values I'd love to know...) > > Me too. :) I believe you can set the values in the tcp_backoff[] array to *low* values (i.e all '1') I did it, it works for a single host, I believe people would kill you if you start distributing a kernel with such a change :) Luigi ==================================================================== Luigi Rizzo Dip. di Ingegneria dell'Informazione email: luigi@iet.unipi.it Universita' di Pisa tel: +39-50-568533 via Diotisalvi 2, 56126 PISA (Italy) fax: +39-50-568522 http://www.iet.unipi.it/~luigi/ ====================================================================