From owner-cvs-src@FreeBSD.ORG Fri Jan 9 05:44:31 2004 Return-Path: Delivered-To: cvs-src@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id E36BA16A4CE; Fri, 9 Jan 2004 05:44:31 -0800 (PST) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id D96FE43D31; Fri, 9 Jan 2004 05:44:30 -0800 (PST) (envelope-from davidxu@freebsd.org) Received: from freebsd.org (davidxu@localhost [127.0.0.1]) i09DiSFR076465; Fri, 9 Jan 2004 05:44:29 -0800 (PST) (envelope-from davidxu@freebsd.org) Message-ID: <3FFEAFC2.8070303@freebsd.org> Date: Fri, 09 Jan 2004 21:42:26 +0800 From: David Xu User-Agent: Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.5) Gecko/20031208 Thunderbird/0.3 X-Accept-Language: en-us, en MIME-Version: 1.0 To: Andre Oppermann References: <200401081740.i08He8J9063202@repoman.freebsd.org> In-Reply-To: <200401081740.i08He8J9063202@repoman.freebsd.org> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit cc: cvs-src@freebsd.org cc: src-committers@freebsd.org cc: cvs-all@freebsd.org Subject: Re: cvs commit: src/sys/netinet ip_icmp.c tcp.h tcp_input.ctcp_subr.c tcp_usrreq.c tcp_var.h X-BeenThere: cvs-src@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: CVS commit messages for the src tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 09 Jan 2004 13:44:32 -0000 I got following messages when I am running mysql stress test suite, and the test can not be completed. "too many small tcp packets from 128.0.0.1:20672, av. 91byte/packet, dropping connection" David Xu Andre Oppermann wrote: > andre 2004/01/08 09:40:07 PST > > FreeBSD src repository > > Modified files: > sys/netinet ip_icmp.c tcp.h tcp_input.c tcp_subr.c > tcp_usrreq.c tcp_var.h > Log: > Limiters and sanity checks for TCP MSS (maximum segement size) > resource exhaustion attacks. > > For network link optimization TCP can adjust its MSS and thus > packet size according to the observed path MTU. This is done > dynamically based on feedback from the remote host and network > components along the packet path. This information can be > abused to pretend an extremely low path MTU.