Wietse Venema:
> I don't know if this is a problem with Windows TCP/IP, or if this
> is a problem with a firewall on the client side.  Reportedly, some
> firewalls randomize TCP sequence numbers but don't update the
> sequence numbers in SACK fields. That would be a sure way to mess
> up TCP.

Quoting from the Linux kernel mailing list, December 2007:

    The Cisco PIX had a bug with SACK handling (CSCse14419, fixed
    in 7.0(7), 7.1(2.34), 7.2(2.2), 8.0(0.141) but perhaps it has
    regressed). A simple trace either side of the firewall will
    show the inconsistency between the TCP sequence number (which
    gets randomised) and the Sack sequence number (which didn't).
    You could disable the TCP Sequence Number Randomisation feature
    and see if the fault reoccurs.

To disable Selective Ack support:

*BSD: sysctl -w net.inet.tcp.sack.enable=0
L*n*x: echo 0 > /proc/sys/net/ipv4/tcp_sack

        Wietse

Reply via email to