public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Re: TCP: Treason uncloaked DoS ??
@ 2004-02-18 10:27 Klaus Ethgen
  2004-02-18 10:55 ` Chris Wedgwood
  0 siblings, 1 reply; 10+ messages in thread
From: Klaus Ethgen @ 2004-02-18 10:27 UTC (permalink / raw)
  To: Andi Kleen; +Cc: linux-kernel

-----BEGIN PGP SIGNED MESSAGE-----

Hi,

I hope I can post to the Kernel Mailinglist if I am not subscribed...

The subject is very long done. But I have not found useful answers to
this strange kernel log message.

You wrote:
> It is a TCP bug of the other side.
> 
> You can safely comment out the printk. It would be interesting however
> to find out what the other side is running and yell at the vendor.
> 
> ...
> 
> More likely someone released a new buggy TCP stack to the world.

Well I have the same every night when my backup on the local host is
running. Many of the "kernel: TCP: Treason uncloaked! Peer
192.168.17.2:2988/33016 shrinks window 3035402428:3035418812. Repaired."

But 192.168.17.2 is the same host! So the buggy TCP stack seams to be in
linux kernel.

By the way, I run 2.4.24.

For answers please address me direct as I'm not subscribet to the list.

Regards
   Klaus
- -- 
Klaus Ethgen                            http://www.ethgen.de/
pub  2048R/D1A4EDE5 2000-02-26 Klaus Ethgen <Klaus@Ethgen.de>
Fingerprint: D7 67 71 C4 99 A6 D4 FE  EA 40 30 57 3C 88 26 2B
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iQEVAwUBQDM+DJ+OKpjRpO3lAQHdAAgAq9WbDQDVuQVphZp99kH4rqQe2iQZEep/
GDCavKxNTLU5/SkPIFjTJVZM9+KEea9toVE4H+vFfrP5bCfrU2lEbqH4vksPXvxy
JP2sNjFGmdRYaDEKMHYmC8kfcwMsD+sUTOT+KVjH75+ZI74yBSPdAmXK7ca196Dq
8HzQrrj+XtDEJlh93cbRKPmbvcODl1pNiRdZYRk7BtFp+TlSNW19ypE8NQKSLysV
o+ccsXQ99Fb3h5hYFr2Pn7qNp77RCsTeg0NZorA+s4ySuoa68abxIznveZNMsKCx
y87TxdQEZaJbcFPkv8aeRfLK4c1/gKpUQgMeKXgThRMy6cmALFsSdA==
=pY9J
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] 10+ messages in thread
[parent not found: <200204191512.g3JFCvl18558@mail.advfn.com.suse.lists.linux.kernel>]
* TCP: Treason uncloaked DoS ??
@ 2002-04-19 15:15 Tim Kay
  0 siblings, 0 replies; 10+ messages in thread
From: Tim Kay @ 2002-04-19 15:15 UTC (permalink / raw)
  To: linux-kernel

[posted here because the message itself apparantly only appears with debug 
stuff on.]

Please forgive my igonorance but our cluster of load balanced web servers 
suddenly produced a run of:

TCP: Treason uncloaked! Peer XXX.XXX.XXX.XXX:4968/6666 shrinks window 
2154146057:2154152518. Repaired.

lines in our error logs. I have tracked this down to timer.c and I can see 
sort of what's going on [ please correct me if I'm wrong but I think  a 
client is saying 'send me something - ah but not at the moment because I'm 
not ready to receive - but don't close the connection']. Question is are 
multiple instances of this from multiple IPs a DoS possiblility. I assume 
that the connections are kept open if the client connecting doesn't actually 
go away so surely lots of these ocurring at once would overload a server. I 
have googled this and an occasional instance seems normal and could be down 
to a broken client, but lots from different IP addr's at once??

I'm a bit concerned that maybe someone is warming up for a hit or something.

Thanks

Tim


^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2004-02-18 14:33 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-02-18 10:27 TCP: Treason uncloaked DoS ?? Klaus Ethgen
2004-02-18 10:55 ` Chris Wedgwood
2004-02-18 12:41   ` [KERNEL] " Klaus Ethgen
2004-02-18 12:48     ` Chris Wedgwood
2004-02-18 12:57       ` [KERNEL] " Klaus Ethgen
2004-02-18 13:02         ` Chris Wedgwood
2004-02-18 14:32   ` Zan Lynx
     [not found] <200204191512.g3JFCvl18558@mail.advfn.com.suse.lists.linux.kernel>
2002-04-19 16:17 ` Andi Kleen
2002-04-19 19:58   ` Yven Leist
  -- strict thread matches above, loose matches on Subject: below --
2002-04-19 15:15 Tim Kay

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox