Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 18 Nov 2018 14:56:08 +0000
From:      bugzilla-noreply@freebsd.org
To:        net@FreeBSD.org
Subject:   [Bug 219991] [PATCH] TCP process bogus packets with too large ACK
Message-ID:  <bug-219991-7501-pXI7kCqRsd@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-219991-7501@https.bugs.freebsd.org/bugzilla/>
References:  <bug-219991-7501@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D219991

Michael Tuexen <tuexen@freebsd.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |tuexen@freebsd.org

--- Comment #1 from Michael Tuexen <tuexen@freebsd.org> ---
Can you provide a .pcap file? Whether the reaction from the FreeBSD side is=
 OK
not not depends on SEG.SEQ of the received ACK segments. Unfortunately, tcp=
dump
doesn't how SEG.SEQ for the ACK segments.

Please note that https://tools.ietf.org/html/rfc793#section-3.9, page 69,
specifies the conditions under which a received TCP segment is acceptable. =
If
the received ACK is not acceptable (this depends on SEG.SEQ), an ACK as the=
 one
being sent has to be sent.

So seeing the SEG.SEQ of the ACK segments is crucial here.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-219991-7501-pXI7kCqRsd>