Andy Furniss wrote:

David S. Miller wrote:

From: "Michal Piotrowski" <[EMAIL PROTECTED]>
Date: Sun, 12 Mar 2006 02:51:40 +0100

I have noticed this warnings
TCP: Treason uncloaked! Peer 82.113.55.2:11759/50967 shrinks window
148470938:148470943. Repaired.
TCP: Treason uncloaked! Peer 82.113.55.2:11759/50967 shrinks window
148470938:148470943. Repaired.
TCP: Treason uncloaked! Peer 82.113.55.2:11759/59768 shrinks window
1124211698:1124211703. Repaired.
TCP: Treason uncloaked! Peer 82.113.55.2:11759/59768 shrinks window
1124211698:1124211703. Repaired.

It maybe problem with ktorrent.


It is a problem with the remote TCP implementation, it is
illegally advertising a smaller window that it previously
did.


Packeteer manipulates window for shaping. I probably misread/read wrong RFC on this but I thought it didn't break any MUST NOTs.

I assume Linux + SFQ reordering packets during window growth would not trigger it.

There is no problem manipulating the TCP window per se. The problem is advertising a window and then shrinking it faster than it is naturally reduced by incoming data, essentially granting credit to transmit x bytes, and then revoking that credit. The net result is the peer transmits data the advertiser said it was going to accept, and then the advertiser drops it on the floor. RFC793 only has a SHOULD NOT for this practice, but it is universally condemned nonetheless.

- Mark B.

-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to