Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 15 Nov 1995 12:53:45 +0100 (MET)
From:      Luigi Rizzo <luigi@labinfo.iet.unipi.it>
To:        joerg_wunsch@uriah.heep.sax.de
Cc:        peter@jhome.DIALix.COM, jgreco@brasil.moneng.mei.com, hackers@freebsd.org
Subject:   Re: if_mux hack?
Message-ID:  <199511151153.MAA03928@labinfo.iet.unipi.it>
In-Reply-To: <199511150807.JAA05424@uriah.heep.sax.de> from "J Wunsch" at Nov 15, 95 09:06:57 am

next in thread | previous in thread | raw e-mail | index | archive | help
> As Peter Wemm wrote:
> > 
> > extremely painful. :-(  TCP is doing so much backoff that it's 
> > practically useless.  (BTW: if there's an easy way to violate the RFC's 
> > by clamp the maximum TCP retransmission values I'd love to know...)
> 
> Me too. :)

I believe you can set the values in the tcp_backoff[] array to *low*
values (i.e all '1')

I did it, it works for a single host, I believe people would kill you
if you start distributing a kernel with such a change :)


	Luigi
====================================================================
Luigi Rizzo                     Dip. di Ingegneria dell'Informazione
email: luigi@iet.unipi.it       Universita' di Pisa
tel: +39-50-568533              via Diotisalvi 2, 56126 PISA (Italy)
fax: +39-50-568522              http://www.iet.unipi.it/~luigi/
====================================================================



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199511151153.MAA03928>