Re: TCP: Treason uncloaked DoS ??

From: Klaus Ethgen
Date: Wed Feb 18 2004 - 05:29:57 EST


-----BEGIN PGP SIGNED MESSAGE-----

Hi,

I hope I can post to the Kernel Mailinglist if I am not subscribed...

The subject is very long done. But I have not found useful answers to
this strange kernel log message.

You wrote:
> It is a TCP bug of the other side.
>
> You can safely comment out the printk. It would be interesting however
> to find out what the other side is running and yell at the vendor.
>
> ...
>
> More likely someone released a new buggy TCP stack to the world.

Well I have the same every night when my backup on the local host is
running. Many of the "kernel: TCP: Treason uncloaked! Peer
192.168.17.2:2988/33016 shrinks window 3035402428:3035418812. Repaired."

But 192.168.17.2 is the same host! So the buggy TCP stack seams to be in
linux kernel.

By the way, I run 2.4.24.

For answers please address me direct as I'm not subscribet to the list.

Regards
Klaus
- --
Klaus Ethgen http://www.ethgen.de/
pub 2048R/D1A4EDE5 2000-02-26 Klaus Ethgen <Klaus@xxxxxxxxx>
Fingerprint: D7 67 71 C4 99 A6 D4 FE EA 40 30 57 3C 88 26 2B
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iQEVAwUBQDM+DJ+OKpjRpO3lAQHdAAgAq9WbDQDVuQVphZp99kH4rqQe2iQZEep/
GDCavKxNTLU5/SkPIFjTJVZM9+KEea9toVE4H+vFfrP5bCfrU2lEbqH4vksPXvxy
JP2sNjFGmdRYaDEKMHYmC8kfcwMsD+sUTOT+KVjH75+ZI74yBSPdAmXK7ca196Dq
8HzQrrj+XtDEJlh93cbRKPmbvcODl1pNiRdZYRk7BtFp+TlSNW19ypE8NQKSLysV
o+ccsXQ99Fb3h5hYFr2Pn7qNp77RCsTeg0NZorA+s4ySuoa68abxIznveZNMsKCx
y87TxdQEZaJbcFPkv8aeRfLK4c1/gKpUQgMeKXgThRMy6cmALFsSdA==
=pY9J
-----END PGP SIGNATURE-----
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/