Hi,

On Thu, 23 Aug 2007 12:55:06 -0500
Dan Farrell <[EMAIL PROTECTED]> wrote:

> > It usually means that the other side of the TCP
> > connection reduced the window to zero size, thus leading stupid TCP
> > stacks to save information on a basically starved connection. The
> > kernel just sends an information to the log, so in case if you
> > recognize the IP and are in charge of the sender, you'll know that it
> > has a veeeeery broken TCP stack. Essentially: Just ignore it, if the
> > sender IP doesn't belong to one of your own networks.
> > 
> I found a line in my Treason-related output that pointed to an internal
> IP on a distcc port.  Should I be worried about this computer?  It's
> running a brand new gentoo install and is solely for the purpose of
> distcc.  

Hm. I don't think so, but I'm not that deep into TCP that I could
easily tell some circumstances when such things can happen and if it
indicates a bug by all means.

There might be a slight possibility that the packet sender was forged.
It depends on your uplink whether such packets can get through.
Additionally, when inside a potentially hostile LAN, you can't trust
any IP adresses.

If it's just a single line, I'd ignore it, I think. But there's no good
reason I could give for that proposal, except of some absent feeling
that anything would be wrong.

-hwh
-- 
[EMAIL PROTECTED] mailing list

Reply via email to