large segment offload (LSO)
can be easily detected by

TCP checksum==0    and being incorrect
and that the segment is much larger than the normal mtu.




On 4/7/06, Guy Harris <[EMAIL PROTECTED]> wrote:
> Hannes Gredler wrote:
> > checked in - thanks for the submission - /hannes
> >
> > On Wed, Jan 19, 2005 at 05:35:13PM -0800, Rick Jones wrote:
> > | A while back I think I posted something asking about what to do about
> TSO
> > | (large send) and how it generated "IP bad-len 0" output  when tracing on
> a
> > | TSO-enabled sender.
> > |
> > | I had a couple spare cycles, so I decided to just take a WAG at what
> might
> > | be done, which was to say that if the IP len was zero, just go ahead and
> > | guess that this was a TSO and set the len to the length parm pass-in to
> > | print-ip and hope.
> >
> > [ ... ]
> >
> > | basically, if the IP len is zero, ass-u-me that the segment is TSO and
> wing
> > | it.
> > |
> > | rick jones
>
> Should we make that the default, or would that be too risky?
>
> See
>
>  
> https://sourceforge.net/tracker/index.php?func=detail&aid=1437110&group_id=53066&atid=469573
>
> which I suspect is caused by TSO.
> -
> This is the tcpdump-workers list.
> Visit https://lists.sandelman.ca/ to unsubscribe.
>
-
This is the tcpdump-workers list.
Visit https://lists.sandelman.ca/ to unsubscribe.

Reply via email to