Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 06 Dec 2019 22:31:25 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 242492] TCP fat open observability
Message-ID:  <bug-242492-227@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D242492

            Bug ID: 242492
           Summary: TCP fat open observability
           Product: Base System
           Version: 12.1-RELEASE
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: kern
          Assignee: bugs@FreeBSD.org
          Reporter: j2465@wizmail.org

A TCP connection made by sendto() with TCP_FASTOPEN set always sets the
TCP_FASTOPEN readback getsockopt.  It would be (possibly more) useful to the
client application to know if a supposedly valid TFO cookie was sent on the=
 SYN
(as opposed to the current possibilty of only having sent a TFO request) an=
d/or
whether the server agreed that the cookie was acceptable.

TCP_INFO TCPOPT_FAST_OPEN appears to match getsockopt/TCP_FASTOPEN, for a
client.

I'm not sure that we really want to go so far as knowing whether client
data-on-SYN was actually accepted with the SYN, but it's another item in the
bucket.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-242492-227>