[prev in list] [next in list] [prev in thread] [next in thread] 

List:       linux-kernel
Subject:    Re: TCP: Treason uncloaked DoS ??
From:       Zan Lynx <zlynx () acm ! org>
Date:       2004-02-18 14:32:53
Message-ID: 1077114772.7182.4.camel () titania ! zlynx ! org
[Download RAW message or body]

On Wed, 2004-02-18 at 03:55, Chris Wedgwood wrote:
> On Wed, Feb 18, 2004 at 11:27:25AM +0100, Klaus Ethgen wrote:
> 
> > Well I have the same every night when my backup on the local host is
> > running. Many of the "kernel: TCP: Treason uncloaked! Peer
> > 192.168.17.2:2988/33016 shrinks window 3035402428:3035418812. Repaired."
> 
> > But 192.168.17.2 is the same host! So the buggy TCP stack seams to
> > be in linux kernel.
> 
> My guess is there is a PacketShaper in between mangling things.

I have seen this same Treason uncloaked! error message between two of my
Linux systems recently, while running rsync backups between them.  One
system is 2.4.21, the other 2.6.2.  I was not using any shaping.

I was trying to figure it out, but I cannot reproduce it reliably, it
seems to just happen.
-- 
Zan Lynx <zlynx@acm.org>

["signature.asc" (application/pgp-signature)]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic