From owner-freebsd-hackers@FreeBSD.ORG Thu Sep 18 08:45:54 2003 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id D006D16A4B3 for ; Thu, 18 Sep 2003 08:45:54 -0700 (PDT) Received: from arginine.spc.org (arginine.spc.org [195.206.69.236]) by mx1.FreeBSD.org (Postfix) with ESMTP id 0EE1243FE0 for ; Thu, 18 Sep 2003 08:45:52 -0700 (PDT) (envelope-from bms@spc.org) Received: from localhost (localhost [127.0.0.1]) by arginine.spc.org (Postfix) with ESMTP id D33336540C; Thu, 18 Sep 2003 16:45:50 +0100 (BST) Received: from arginine.spc.org ([127.0.0.1]) by localhost (arginine.spc.org [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 25627-02-3; Thu, 18 Sep 2003 16:45:50 +0100 (BST) Received: from saboteur.dek.spc.org (unknown [81.3.72.68]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by arginine.spc.org (Postfix) with ESMTP id E373E6540A; Thu, 18 Sep 2003 16:45:49 +0100 (BST) Received: by saboteur.dek.spc.org (Postfix, from userid 1001) id F29CA13; Thu, 18 Sep 2003 13:39:09 +0100 (BST) Date: Thu, 18 Sep 2003 13:39:09 +0100 From: Bruce M Simpson To: Deepak Jain Message-ID: <20030918123909.GB3431@saboteur.dek.spc.org> Mail-Followup-To: Deepak Jain , "freebsd-hackers@FreeBSD. ORG" References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Organization: SPC cc: "freebsd-hackers@FreeBSD. ORG" Subject: Re: TCP information X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 18 Sep 2003 15:45:54 -0000 On Wed, Sep 17, 2003 at 08:34:54PM -0400, Deepak Jain wrote: > Is there a utility/hack/patch that would allow a diligent sysadmin to obtain > which specific TCP connections are generating retransmits and receiving > packet drops? netstat will show me drops on an interface, but not on a > specific source/dest pair? Such a thing would need to be written, or adapted from an existing tcp tool. ports/net/trafd would probably be a good place to start. BMS