Justin Tocci:
> On Jun 2, 2011, at 7:44 PM, Wietse Venema wrote:
> 
> > Justin Tocci:
> >> I did find out how to dump fancier output which I think someone wanted. 
> >> 
> >> tcpdump -AXXr /opt/mail/dump10.txt
> >> 
> >> 17:08:23.323379 IP server.workflowproducts.com.smtp > 
> >> mx-ecom.netflix.com.29698: Flags [.], seq 1:47, ack 1, win 65535, length 46
> > 
> > Where is the SYN handshake with the TCP-level options?
> > 
> >     Wietse
> 
> 
> I didn't want to flood the list with output so I only printed what I thoug
>-ht was a complete connection. I am guessing you mean I didn't show enough of
>- the connection. Here is everything I got in that capture:
> 
> root@server:~
> $ tcpdump -Avvr /opt/mail/dump12.txt 
> reading from file /opt/mail/dump12.txt, link-type EN10MB (Ethernet)
> 19:27:28.397765 IP (tos 0x0, ttl 46, id 18783, offset 0, flags [DF], proto 
> TCP (6), length 52)
>     mx-ecom.netflix.com.61142 > server.workflowproducts.com.smtp: Flags [S], 
> cksum 0x8338 (correct), seq 1953720321, win 5840, options [mss 
> 1380,nop,nop,sackOK,nop,wscale 7], length 0
> e.....@....p.kl...,.....tsh..........8.....d........
> 19:27:28.397838 IP (tos 0x0, ttl 64, id 3095, offset 0, flags [DF], proto TCP 
> (6), length 52, bad cksum 0 (->24b9)!)
>     server.workflowproducts.com.smtp > mx-ecom.netflix.com.61142: Flags [S.], 
> cksum 0x0a1b (incorrect -> 0xc31e), seq 1089115808, ack 1953720322, win 
> 65535, options [mss 1460,nop,wscale 6,sackOK,eol], length 0

As you can see, both the sending host and the receiving host are
willing to use TCP Window scaling. 

This feature is often mis-implemented by crappy firewalls and
routers. 

Turn it off, as repeatedly asked by Victor.

        Wietse

Reply via email to