[prev in list] [next in list] [prev in thread] [next in thread]
List: linux-kernel
Subject: Re: TCP: Treason uncloaked DoS ??
From: Zan Lynx <zlynx () acm ! org>
Date: 2004-02-18 14:32:53
Message-ID: 1077114772.7182.4.camel () titania ! zlynx ! org
[Download RAW message or body]
On Wed, 2004-02-18 at 03:55, Chris Wedgwood wrote:
> On Wed, Feb 18, 2004 at 11:27:25AM +0100, Klaus Ethgen wrote:
>
> > Well I have the same every night when my backup on the local host is
> > running. Many of the "kernel: TCP: Treason uncloaked! Peer
> > 192.168.17.2:2988/33016 shrinks window 3035402428:3035418812. Repaired."
>
> > But 192.168.17.2 is the same host! So the buggy TCP stack seams to
> > be in linux kernel.
>
> My guess is there is a PacketShaper in between mangling things.
I have seen this same Treason uncloaked! error message between two of my
Linux systems recently, while running rsync backups between them. One
system is 2.4.21, the other 2.6.2. I was not using any shaping.
I was trying to figure it out, but I cannot reproduce it reliably, it
seems to just happen.
--
Zan Lynx <zlynx@acm.org>
["signature.asc" (application/pgp-signature)]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic