[PATCH 5.11 129/210] mlxsw: spectrum: Fix ECN marking in tunnel decapsulation

2021-04-12 Thread Greg Kroah-Hartman
From: Ido Schimmel [ Upstream commit 66167c310deb4ac1725f81004fb4b504676ad0bf ] Cited commit changed the behavior of the software data path with regards to the ECN marking of decapsulated packets. However, the commit did not change other callers of __INET_ECN_decapsulate(), namely mlxsw. The

[PATCH 5.10 118/188] mlxsw: spectrum: Fix ECN marking in tunnel decapsulation

2021-04-12 Thread Greg Kroah-Hartman
From: Ido Schimmel [ Upstream commit 66167c310deb4ac1725f81004fb4b504676ad0bf ] Cited commit changed the behavior of the software data path with regards to the ECN marking of decapsulated packets. However, the commit did not change other callers of __INET_ECN_decapsulate(), namely mlxsw. The

[PATCH 5.11 185/254] selftests: forwarding: vxlan_bridge_1d: Fix vxlan ecn decapsulate value

2021-03-29 Thread Greg Kroah-Hartman
From: Hangbin Liu [ Upstream commit 5aa3c334a449bab24519c4967f5ac2b3304c8dcf ] The ECN bit defines ECT(1) = 1, ECT(0) = 2. So inner 0x02 + outer 0x01 should be inner ECT(0) + outer ECT(1). Based on the description of __INET_ECN_decapsulate, the final decapsulate value should be ECT(1). So fix

[PATCH 5.10 162/221] selftests: forwarding: vxlan_bridge_1d: Fix vxlan ecn decapsulate value

2021-03-29 Thread Greg Kroah-Hartman
From: Hangbin Liu [ Upstream commit 5aa3c334a449bab24519c4967f5ac2b3304c8dcf ] The ECN bit defines ECT(1) = 1, ECT(0) = 2. So inner 0x02 + outer 0x01 should be inner ECT(0) + outer ECT(1). Based on the description of __INET_ECN_decapsulate, the final decapsulate value should be ECT(1). So fix

[PATCH 5.4 085/111] selftests: forwarding: vxlan_bridge_1d: Fix vxlan ecn decapsulate value

2021-03-29 Thread Greg Kroah-Hartman
From: Hangbin Liu [ Upstream commit 5aa3c334a449bab24519c4967f5ac2b3304c8dcf ] The ECN bit defines ECT(1) = 1, ECT(0) = 2. So inner 0x02 + outer 0x01 should be inner ECT(0) + outer ECT(1). Based on the description of __INET_ECN_decapsulate, the final decapsulate value should be ECT(1). So fix

[PATCH 5.10 150/199] netfilter: rpfilter: mask ecn bits before fib lookup

2021-01-26 Thread Greg Kroah-Hartman
From: Guillaume Nault commit 2e5a6266fbb11ae93c468dfecab169aca9c27b43 upstream. RT_TOS() only masks one of the two ECN bits. Therefore rpfilter_mt() treats Not-ECT or ECT(1) packets in a different way than those with ECT(0) or CE. Reproducer: Create two netns, connected with a veth: $ ip

[PATCH 5.4 69/86] netfilter: rpfilter: mask ecn bits before fib lookup

2021-01-26 Thread Greg Kroah-Hartman
From: Guillaume Nault commit 2e5a6266fbb11ae93c468dfecab169aca9c27b43 upstream. RT_TOS() only masks one of the two ECN bits. Therefore rpfilter_mt() treats Not-ECT or ECT(1) packets in a different way than those with ECT(0) or CE. Reproducer: Create two netns, connected with a veth: $ ip

[PATCH 4.19 44/58] netfilter: rpfilter: mask ecn bits before fib lookup

2021-01-26 Thread Greg Kroah-Hartman
From: Guillaume Nault commit 2e5a6266fbb11ae93c468dfecab169aca9c27b43 upstream. RT_TOS() only masks one of the two ECN bits. Therefore rpfilter_mt() treats Not-ECT or ECT(1) packets in a different way than those with ECT(0) or CE. Reproducer: Create two netns, connected with a veth: $ ip

[PATCH 4.9 10/45] ipv4: Ignore ECN bits for fib lookups in fib_compute_spec_dst()

2021-01-11 Thread Greg Kroah-Hartman
From: Guillaume Nault [ Upstream commit 21fdca22eb7df2a1e194b8adb812ce370748b733 ] RT_TOS() only clears one of the ECN bits. Therefore, when fib_compute_spec_dst() resorts to a fib lookup, it can return different results depending on the value of the second ECN bit. For example, ECT(0) and ECT

[PATCH 4.19 27/77] ipv4: Ignore ECN bits for fib lookups in fib_compute_spec_dst()

2021-01-11 Thread Greg Kroah-Hartman
From: Guillaume Nault [ Upstream commit 21fdca22eb7df2a1e194b8adb812ce370748b733 ] RT_TOS() only clears one of the ECN bits. Therefore, when fib_compute_spec_dst() resorts to a fib lookup, it can return different results depending on the value of the second ECN bit. For example, ECT(0) and ECT

[PATCH 5.4 33/92] ipv4: Ignore ECN bits for fib lookups in fib_compute_spec_dst()

2021-01-11 Thread Greg Kroah-Hartman
From: Guillaume Nault [ Upstream commit 21fdca22eb7df2a1e194b8adb812ce370748b733 ] RT_TOS() only clears one of the ECN bits. Therefore, when fib_compute_spec_dst() resorts to a fib lookup, it can return different results depending on the value of the second ECN bit. For example, ECT(0) and ECT

[PATCH 5.10 034/145] ipv4: Ignore ECN bits for fib lookups in fib_compute_spec_dst()

2021-01-11 Thread Greg Kroah-Hartman
From: Guillaume Nault [ Upstream commit 21fdca22eb7df2a1e194b8adb812ce370748b733 ] RT_TOS() only clears one of the ECN bits. Therefore, when fib_compute_spec_dst() resorts to a fib lookup, it can return different results depending on the value of the second ECN bit. For example, ECT(0) and ECT

[PATCH 4.14 17/57] ipv4: Ignore ECN bits for fib lookups in fib_compute_spec_dst()

2021-01-11 Thread Greg Kroah-Hartman
From: Guillaume Nault [ Upstream commit 21fdca22eb7df2a1e194b8adb812ce370748b733 ] RT_TOS() only clears one of the ECN bits. Therefore, when fib_compute_spec_dst() resorts to a fib lookup, it can return different results depending on the value of the second ECN bit. For example, ECT(0) and ECT

[PATCH 4.4 07/38] ipv4: Ignore ECN bits for fib lookups in fib_compute_spec_dst()

2021-01-11 Thread Greg Kroah-Hartman
From: Guillaume Nault [ Upstream commit 21fdca22eb7df2a1e194b8adb812ce370748b733 ] RT_TOS() only clears one of the ECN bits. Therefore, when fib_compute_spec_dst() resorts to a fib lookup, it can return different results depending on the value of the second ECN bit. For example, ECT(0) and ECT

[PATCH 4.4 15/39] geneve: pull IP header before ECN decapsulation

2020-12-10 Thread Greg Kroah-Hartman
From: Eric Dumazet IP_ECN_decapsulate() and IP6_ECN_decapsulate() assume IP header is already pulled. geneve does not ensure this yet. Fixing this generically in IP_ECN_decapsulate() and IP6_ECN_decapsulate() is not possible, since callers pass a pointer that might be freed by pskb_may_pull()

[PATCH 4.9 21/45] geneve: pull IP header before ECN decapsulation

2020-12-10 Thread Greg Kroah-Hartman
From: Eric Dumazet IP_ECN_decapsulate() and IP6_ECN_decapsulate() assume IP header is already pulled. geneve does not ensure this yet. Fixing this generically in IP_ECN_decapsulate() and IP6_ECN_decapsulate() is not possible, since callers pass a pointer that might be freed by pskb_may_pull()

[PATCH 4.14 04/31] geneve: pull IP header before ECN decapsulation

2020-12-10 Thread Greg Kroah-Hartman
From: Eric Dumazet IP_ECN_decapsulate() and IP6_ECN_decapsulate() assume IP header is already pulled. geneve does not ensure this yet. Fixing this generically in IP_ECN_decapsulate() and IP6_ECN_decapsulate() is not possible, since callers pass a pointer that might be freed by pskb_may_pull()

Re: [PATCH 4.4 15/39] geneve: pull IP header before ECN decapsulation

2020-12-10 Thread Greg Kroah-Hartman
On Thu, Dec 10, 2020 at 03:32:12PM +0100, Eric Dumazet wrote: > On Thu, Dec 10, 2020 at 3:26 PM Greg Kroah-Hartman > wrote: > > > > From: Eric Dumazet > > > > IP_ECN_decapsulate() and IP6_ECN_decapsulate() assume > > IP header is already pulled. > > > > geneve does not ensure this yet. > > > > Fi

Re: [PATCH 4.4 15/39] geneve: pull IP header before ECN decapsulation

2020-12-10 Thread Greg Kroah-Hartman
On Thu, Dec 10, 2020 at 03:53:09PM +0100, Eric Dumazet wrote: > On Thu, Dec 10, 2020 at 3:40 PM Greg Kroah-Hartman > wrote: > > > > On Thu, Dec 10, 2020 at 03:38:44PM +0100, Greg Kroah-Hartman wrote: > > > On Thu, Dec 10, 2020 at 03:32:12PM +0100, Eric Dumazet wrote: > > > > On Thu, Dec 10, 2020 a

Re: [PATCH 4.4 15/39] geneve: pull IP header before ECN decapsulation

2020-12-10 Thread Greg Kroah-Hartman
On Thu, Dec 10, 2020 at 03:38:44PM +0100, Greg Kroah-Hartman wrote: > On Thu, Dec 10, 2020 at 03:32:12PM +0100, Eric Dumazet wrote: > > On Thu, Dec 10, 2020 at 3:26 PM Greg Kroah-Hartman > > wrote: > > > > > > From: Eric Dumazet > > > > > > IP_ECN_decapsulate() and IP6_ECN_decapsulate() assume >

Re: [PATCH 4.4 15/39] geneve: pull IP header before ECN decapsulation

2020-12-10 Thread Eric Dumazet
On Thu, Dec 10, 2020 at 3:40 PM Greg Kroah-Hartman wrote: > > On Thu, Dec 10, 2020 at 03:38:44PM +0100, Greg Kroah-Hartman wrote: > > On Thu, Dec 10, 2020 at 03:32:12PM +0100, Eric Dumazet wrote: > > > On Thu, Dec 10, 2020 at 3:26 PM Greg Kroah-Hartman > > > wrote: > > > > > > > > From: Eric Duma

Re: [PATCH 4.4 15/39] geneve: pull IP header before ECN decapsulation

2020-12-10 Thread Eric Dumazet
On Thu, Dec 10, 2020 at 3:26 PM Greg Kroah-Hartman wrote: > > From: Eric Dumazet > > IP_ECN_decapsulate() and IP6_ECN_decapsulate() assume > IP header is already pulled. > > geneve does not ensure this yet. > > Fixing this generically in IP_ECN_decapsulate() and > IP6_ECN_decapsulate() is not pos

[PATCH 5.9 24/46] geneve: pull IP header before ECN decapsulation

2020-12-06 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 4179b00c04d18ea7013f68d578d80f3c9d13150a ] IP_ECN_decapsulate() and IP6_ECN_decapsulate() assume IP header is already pulled. geneve does not ensure this yet. Fixing this generically in IP_ECN_decapsulate() and IP6_ECN_decapsulate() is not possible, since c

[PATCH 5.4 22/39] geneve: pull IP header before ECN decapsulation

2020-12-06 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 4179b00c04d18ea7013f68d578d80f3c9d13150a ] IP_ECN_decapsulate() and IP6_ECN_decapsulate() assume IP header is already pulled. geneve does not ensure this yet. Fixing this generically in IP_ECN_decapsulate() and IP6_ECN_decapsulate() is not possible, since c

[PATCH 4.19 18/32] geneve: pull IP header before ECN decapsulation

2020-12-06 Thread Greg Kroah-Hartman
From: Eric Dumazet [ Upstream commit 4179b00c04d18ea7013f68d578d80f3c9d13150a ] IP_ECN_decapsulate() and IP6_ECN_decapsulate() assume IP header is already pulled. geneve does not ensure this yet. Fixing this generically in IP_ECN_decapsulate() and IP6_ECN_decapsulate() is not possible, since c

[PATCH 5.7 022/265] tcp: don't ignore ECN CWR on pure ACK

2020-06-29 Thread Sasha Levin
incoming segments with CE set +0.1 <[ect0] . 11001:12001(1000) ack 1001 win 65535 +0.0 <[ce]. 12001:13001(1000) ack 1001 win 65535 +0.0 <[ect0] P. 13001:14001(1000) ack 1001 win 65535 // Stack repsonds with ECN ECHO +0.0 >[noecn] . 1001:1001(0) ack 12001 +0.0 >[noecn] E. 1001:10

[PATCH 4.19 028/131] tcp: don't ignore ECN CWR on pure ACK

2020-06-29 Thread Sasha Levin
incoming segments with CE set +0.1 <[ect0] . 11001:12001(1000) ack 1001 win 65535 +0.0 <[ce]. 12001:13001(1000) ack 1001 win 65535 +0.0 <[ect0] P. 13001:14001(1000) ack 1001 win 65535 // Stack repsonds with ECN ECHO +0.0 >[noecn] . 1001:1001(0) ack 12001 +0.0 >[noecn] E. 1001:10

[PATCH 5.4 018/178] tcp: don't ignore ECN CWR on pure ACK

2020-06-29 Thread Sasha Levin
incoming segments with CE set +0.1 <[ect0] . 11001:12001(1000) ack 1001 win 65535 +0.0 <[ce]. 12001:13001(1000) ack 1001 win 65535 +0.0 <[ect0] P. 13001:14001(1000) ack 1001 win 65535 // Stack repsonds with ECN ECHO +0.0 >[noecn] . 1001:1001(0) ack 12001 +0.0 >[noecn] E. 1001:10

[PATCH 5.6 053/118] wireguard: receive: use tunnel helpers for decapsulating ECN markings

2020-05-13 Thread Greg Kroah-Hartman
From: "Toke H�iland-J�rgensen" [ Upstream commit eebabcb26ea1e3295704477c6cd4e772c96a9559 ] WireGuard currently only propagates ECN markings on tunnel decap according to the old RFC3168 specification. However, the spec has since been updated in RFC6040 to recommend slightly

[PATCH 4.19 15/63] net/mlx5e: Set ECN for received packets using CQE indication

2019-09-29 Thread Greg Kroah-Hartman
certain configuration, under congestion, the HW emulates a switch doing ECN marking on packets using ECN indication on the completion descriptor (CQE). The driver needs to set the ECN bits on the packet SKB, such that the network stack can react on that, this commit does that. Needed by downstream

[PATCH 3.18 72/85] tcp: add one more quick ack after after ECN events

2018-08-07 Thread Greg Kroah-Hartman
) made us rethink about our recent patch removing ~16 quick acks after ECN events. tcp_enter_quickack_mode(sk, 1) makes sure one immediate ack is sent, but in the case the sender cwnd was lowered to 1, we do not want to have a delayed ack for the next packet we will receive. Fixes: 522040ea5fdd

[PATCH 3.18 70/85] tcp: do not aggressively quick ack after ECN events

2018-08-07 Thread Greg Kroah-Hartman
3.18-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 522040ea5fdd1c33bbf75e1d7c7c0422b96a94ef ] ECN signals currently forces TCP to enter quickack mode for up to 16 (TCP_MAX_QUICKACKS) following incoming packets

[PATCH 4.4 111/124] tcp: do not aggressively quick ack after ECN events

2018-08-04 Thread Greg Kroah-Hartman
4.4-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 522040ea5fdd1c33bbf75e1d7c7c0422b96a94ef ] ECN signals currently forces TCP to enter quickack mode for up to 16 (TCP_MAX_QUICKACKS) following incoming packets

[PATCH 4.4 113/124] tcp: add one more quick ack after after ECN events

2018-08-04 Thread Greg Kroah-Hartman
) made us rethink about our recent patch removing ~16 quick acks after ECN events. tcp_enter_quickack_mode(sk, 1) makes sure one immediate ack is sent, but in the case the sender cwnd was lowered to 1, we do not want to have a delayed ack for the next packet we will receive. Fixes: 522040ea5fdd (&quo

[PATCH 4.9 15/32] tcp: add one more quick ack after after ECN events

2018-08-04 Thread Greg Kroah-Hartman
) made us rethink about our recent patch removing ~16 quick acks after ECN events. tcp_enter_quickack_mode(sk, 1) makes sure one immediate ack is sent, but in the case the sender cwnd was lowered to 1, we do not want to have a delayed ack for the next packet we will receive. Fixes: 522040ea5fdd (&quo

[PATCH 4.9 13/32] tcp: do not aggressively quick ack after ECN events

2018-08-04 Thread Greg Kroah-Hartman
4.9-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 522040ea5fdd1c33bbf75e1d7c7c0422b96a94ef ] ECN signals currently forces TCP to enter quickack mode for up to 16 (TCP_MAX_QUICKACKS) following incoming packets

[PATCH 4.17 331/336] tcp: do not aggressively quick ack after ECN events

2018-08-01 Thread Greg Kroah-Hartman
4.17-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 522040ea5fdd1c33bbf75e1d7c7c0422b96a94ef ] ECN signals currently forces TCP to enter quickack mode for up to 16 (TCP_MAX_QUICKACKS) following incoming packets

[PATCH 4.17 333/336] tcp: add one more quick ack after after ECN events

2018-08-01 Thread Greg Kroah-Hartman
) made us rethink about our recent patch removing ~16 quick acks after ECN events. tcp_enter_quickack_mode(sk, 1) makes sure one immediate ack is sent, but in the case the sender cwnd was lowered to 1, we do not want to have a delayed ack for the next packet we will receive. Fixes: 522040ea5fdd

[PATCH 4.14 244/246] tcp: do not aggressively quick ack after ECN events

2018-08-01 Thread Greg Kroah-Hartman
4.14-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 522040ea5fdd1c33bbf75e1d7c7c0422b96a94ef ] ECN signals currently forces TCP to enter quickack mode for up to 16 (TCP_MAX_QUICKACKS) following incoming packets

[PATCH 4.14 246/246] tcp: add one more quick ack after after ECN events

2018-08-01 Thread Greg Kroah-Hartman
) made us rethink about our recent patch removing ~16 quick acks after ECN events. tcp_enter_quickack_mode(sk, 1) makes sure one immediate ack is sent, but in the case the sender cwnd was lowered to 1, we do not want to have a delayed ack for the next packet we will receive. Fixes: 522040ea5fdd

[PATCH 4.15 14/84] tcp: allow TLP in ECN CWR

2018-03-23 Thread Greg Kroah-Hartman
4.15-stable review patch. If anyone has any objections, please let me know. -- From: Neal Cardwell [ Upstream commit b4f70c3d4ec32a2ff4c62e1e2da0da5f55fe12bd ] This patch enables tail loss probe in cwnd reduction (CWR) state to detect potential losses. Prior to this patch, si

[PATCH AUTOSEL for 4.15 15/78] tcp: allow TLP in ECN CWR

2018-03-07 Thread Sasha Levin
From: Neal Cardwell [ Upstream commit b4f70c3d4ec32a2ff4c62e1e2da0da5f55fe12bd ] This patch enables tail loss probe in cwnd reduction (CWR) state to detect potential losses. Prior to this patch, since the sender uses PRR to determine the cwnd in CWR state, the combination of CWR+PRR plus tcp_tso

Process phantom ECN event in TCP without CWR response

2017-05-22 Thread Lars Erik Storbukås
I'm trying to generate phantom ECN events to (manually) decrease the transmission rate/throughput. The signals is meant to be generated and received on a single host. I don't want the ECN event to generate a CWR (Congestion Window Reduced) response to the sender. I'm trying to t

Process phantom ECN event in TCP without CWR response

2017-05-22 Thread Lars Erik Storbukås
I'm trying to generate phantom ECN events to (manually) decrease the transmission rate/throughput. The signals is meant to be generated and received on a single host. I don't want the ECN event to generate a CWR (Congestion Window Reduced) response to the sender. I'm trying to t

[PATCH 3.2 160/164] tcp: be more strict before accepting ECN negociation

2014-12-11 Thread Ben Hutchings
3.2.65-rc1 review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet commit bd14b1b2e29bd6812597f896dde06eaf7c6d2f24 upstream. It appears some networks play bad games with the two bits reserved for ECN. This can trigger false congestion

[PATCH 3.16 338/357] ipvs: Maintain all DSCP and ECN bits for ipv6 tun forwarding

2014-10-03 Thread Greg Kroah-Hartman
, though whether or not we should reflect ECN bits may be up for debate. Signed-off-by: Alex Gartrell Acked-by: Julian Anastasov Signed-off-by: Simon Horman Signed-off-by: Greg Kroah-Hartman --- net/netfilter/ipvs/ip_vs_xmit.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net

[PATCH 3.10 129/143] ipvs: Maintain all DSCP and ECN bits for ipv6 tun forwarding

2014-10-03 Thread Greg Kroah-Hartman
, though whether or not we should reflect ECN bits may be up for debate. Signed-off-by: Alex Gartrell Acked-by: Julian Anastasov Signed-off-by: Simon Horman Signed-off-by: Greg Kroah-Hartman --- net/netfilter/ipvs/ip_vs_xmit.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net

[PATCH 3.14 224/238] ipvs: Maintain all DSCP and ECN bits for ipv6 tun forwarding

2014-10-03 Thread Greg Kroah-Hartman
, though whether or not we should reflect ECN bits may be up for debate. Signed-off-by: Alex Gartrell Acked-by: Julian Anastasov Signed-off-by: Simon Horman Signed-off-by: Greg Kroah-Hartman --- net/netfilter/ipvs/ip_vs_xmit.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net

[ 67/85] ipv6: GRO should be ECN friendly

2012-10-25 Thread Greg Kroah-Hartman
3.6-stable review patch. If anyone has any objections, please let me know. -- From: Eric Dumazet [ Upstream commit 51ec04038c113a811b177baa85d293feff9ce995 ] IPv4 side of the problem was addressed in commit a9e050f4e7f9d (net: tcp: GRO should be ECN friendly) This patch

Re: FYI: ECN approved as Standard

2001-06-14 Thread Ralf Baechle
On Thu, Jun 14, 2001 at 01:33:53PM +0200, Anders Peter Fugmann wrote: > Great to hear, but I cannot find anything that backs it up. > I really want to see the final RFC. > > Perhaps you could send me an URL pointing to it? Usually takes a few days until the RFC editor will announce and publish

Re: FYI: ECN approved as Standard

2001-06-14 Thread Anders Peter Fugmann
Hi Jamal Great to hear, but I cannot find anything that backs it up. I really want to see the final RFC. Perhaps you could send me an URL pointing to it? TIA Anders Fugmann jamal wrote: > > The IESG approved ECN as a proposed standard on the 12th of June. > That means as of no

FYI: ECN approved as Standard

2001-06-13 Thread jamal
The IESG approved ECN as a proposed standard on the 12th of June. That means as of now, anyone blocking ECN bits is considered to be blaspheming. cheers, jamal - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTE

Re: ECN is on!

2001-05-25 Thread Steve Modica
Rogier Wolff wrote: > The "we'll turn it on in February" warning is worth NOTHING in this > situation: February comes and goes. March comes and goes. Everybody > who read the warning will think: Ok, so I must be fine. > > A warning of the form: "ECN will g

Re: ECN is on!

2001-05-23 Thread Matti Aarnio
Folks, herewith I declare this topic ("ECN is on") TABOO, if you want to continue discussing it, do that at linux-kernel WITH NEW TOPIC. My original message had reply-to pointing to linux-kernel, but all it takes is single person to ignore that... Spare the other

Re: ECN is on!

2001-05-22 Thread Matthias Andree
Richard Gooch <[EMAIL PROTECTED]> writes: > Sure, Dave is being bloody-minded, but that's the only way we'll see > people get off their fat, lazy asses and fix their broken systems. > In fact, hopefully he's still in a dark mood, and he may take up the > suggestion to bounce mails of the followin

Re: Final Warning [ was: ECN is on! ]

2001-05-22 Thread Matti Aarnio
On Tue, May 22, 2001 at 11:55:59AM -0500, Joe Barr wrote: > What is ECN? Is it the reason SNORT has started this lately: http://vger.kernel.org/ Follow the links, and you will get an exellent answer. > > Active System Attack Alerts > =-=-=-=-=-=-=-=-=-=-=-=-=-= > May 2

Re: ECN is on!

2001-05-22 Thread Matti Aarnio
FOLKS, I HAVE ALL THE TIME USED 'Reply-To:' HEADER POINTING TO linux-kernel -- INSTEAD OF ALL THE LISTS... If you want to continue this, do it there. (Before I decide to taboo "Re: ECN is on!" subject line..) On Tue, May 22, 2001 at 12:23:29PM -0400, Richard Goo

Re: Final Warning [ was: ECN is on! ]

2001-05-22 Thread Joe Barr
What is ECN? Is it the reason SNORT has started this lately: Active System Attack Alerts =-=-=-=-=-=-=-=-=-=-=-=-=-= May 22 10:11:18 pooh snort: spp_portscan: PORTSCAN DETECTED from 199.183.24.194 (STEALTH) May 22 10:11:22 pooh snort: spp_portscan: portscan status from 199.183.24.194: 1

RE: ECN is on!

2001-05-22 Thread Christian, Chip
PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: ECN is on! Rogier Wolff wrote: > The "we'll turn it on in February" warning is worth NOTHING in this > situation: February comes and goes. March comes and goes. Everybody > who read the warning will

Re: ECN is on!

2001-05-22 Thread Richard Gooch
Tony Hoyle writes: > Richard Gooch wrote: > > > In fact, hopefully he's still in a dark mood, and he may take up the > > suggestion to bounce mails of the following type: > > - MIME encoded > > - HTML encoded > > - quoted printables (those stupid "=20" things are particuarly hard to > > read).

Re: ECN is on!

2001-05-22 Thread Richard Gooch
Matti Aarnio writes: > On Tue, May 22, 2001 at 09:06:25AM -0400, Richard Gooch wrote: > ... > > Sure, Dave is being bloody-minded, but that's the only way we'll see > > people get off their fat, lazy asses and fix their broken systems. > > In fact, hopefully he's still in a dark mood, and he may t

Re: ECN is on!

2001-05-22 Thread Rogier Wolff
#x27;s announcement, I updated the FAQ > to reflect that we're now running ECN. > > People have had plenty of warning. Think of it as a bonus that it > didn't happen back in February. They've had an extra 3 months to sort > something out. The "we'll turn it on in

Re: ECN is on!

2001-05-22 Thread Matti Aarnio
On Tue, May 22, 2001 at 05:00:22PM +0100, Tony Hoyle wrote: > > suggestion to bounce mails of the following type: > > - MIME encoded > > - HTML encoded > > - quoted printables (those stupid "=20" things are particuarly hard to > > read). > > Surely it'd be better to get the list to filter them

Re: ECN is on!

2001-05-22 Thread Matti Aarnio
On Tue, May 22, 2001 at 09:06:25AM -0400, Richard Gooch wrote: ... > Sure, Dave is being bloody-minded, but that's the only way we'll see > people get off their fat, lazy asses and fix their broken systems. > In fact, hopefully he's still in a dark mood, and he may take up the > suggestion to boun

Re: ECN is on!

2001-05-22 Thread Tony Hoyle
Richard Gooch wrote: > In fact, hopefully he's still in a dark mood, and he may take up the > suggestion to bounce mails of the following type: > - MIME encoded > - HTML encoded > - quoted printables (those stupid "=20" things are particuarly hard to > read). Surely it'd be better to get the l

Re: ECN is on!

2001-05-22 Thread Richard Gooch
Brent D. Norris writes: > > I veto, the whole point of moving to ECN was to make a statement and > > get people to fix their kit. > > > > We will remove these people, that's all. > > Isn't this a problem though because the messge saying that ECN was > e

Re: ECN is on!

2001-05-22 Thread Richard Gooch
Alan Cox writes: > > Matti Aarnio writes: > > > I am contemplating to periodically turn off the ECN bit to > > > let email out, but DaveM has veto there. > > > > I veto, the whole point of moving to ECN was to make a statement and > > get people to fi

Re: Final Warning [ was: ECN is on! ]

2001-05-22 Thread Matti Aarnio
Folks, don't speculate. You are late anyway. We just had ECN off for two hours, and all sites which didn't commit harakiri at their firewalls ("bad TCP frame from that address, I will place that source into dead list") now either got their message, or are h

Final Warning [ was: ECN is on! ]

2001-05-22 Thread David Relson
ll be re-enabled on June 10th or something, and everyone must >do thus and so or they will break on that day? > >Vague things like "it'll be turned on real soon now" or ASAP really mean >"never" since admins always have things with real deadlines at the top >of

Re: ECN is on!

2001-05-22 Thread Steve Modica
"David S. Miller" wrote: > > Matti Aarnio writes: > > I am contemplating to periodically turn off the ECN bit to > > let email out, but DaveM has veto there. > > I veto, the whole point of moving to ECN was to make a statement and > get people to fix

Re: ECN is on!

2001-05-22 Thread Erik Mouw
On Tue, May 22, 2001 at 06:51:57AM -0500, Brent D. Norris wrote: > > I veto, the whole point of moving to ECN was to make a statement and > > get people to fix their kit. > > > Isn't this a problem though because the messge saying that ECN was enabled > was set after

Re: ECN is on!

2001-05-22 Thread Graham Murray
Matti Aarnio <[EMAIL PROTECTED]> writes: > ... and immediately I have been able to verify a bunch of > domains/servers which won't get thru when incoming connection > has ECN. As a matter of interest, are you also noting how many actually negotiate ECN rather than simp

Re: ECN is on!

2001-05-22 Thread Brent D. Norris
> I veto, the whole point of moving to ECN was to make a statement and > get people to fix their kit. > Isn't this a problem though because the messge saying that ECN was enabled was set after ECN was enabled? Thus these people have no idea what is going on and they probably won&

Re: ECN is on!

2001-05-22 Thread Bohdan Vlasyuk
On Tue, May 22, 2001 at 01:10:31PM +0300, Matti Aarnio wrote: > This list is NOT exhaustive of domains with problems, it > primarily lists only those who are subscribers of linux-kernel, > and thus accumulated (al lot) more than 1 email with "connection > timed out" status into vger's queue. > >

Re: ECN is on!

2001-05-22 Thread Alan Cox
> Matti Aarnio writes: > > I am contemplating to periodically turn off the ECN bit to > > let email out, but DaveM has veto there. > > I veto, the whole point of moving to ECN was to make a statement and > get people to fix their kit. > > We will remove these p

Re: ECN is on!

2001-05-22 Thread David S. Miller
Matti Aarnio writes: > I am contemplating to periodically turn off the ECN bit to > let email out, but DaveM has veto there. I veto, the whole point of moving to ECN was to make a statement and get people to fix their kit. We will remove these people, that's all. Later, Davi

ECN is on!

2001-05-22 Thread Matti Aarnio
... and immediately I have been able to verify a bunch of domains/servers which won't get thru when incoming connection has ECN.I tested all of these with Linux running ECN, and Solaris 2.6 without ECN. When Solaris got connection, and ECN-Linux didn't, domain and its server

Re: ECN: Volunteers needed

2001-05-11 Thread David Ford
I simply crontab an ECN off period for five minutes every hour and flush the mail queue. David. Holger Lubitz wrote: >"H. Peter Anvin" wrote: > >>I suspect that the main way to get this thing fixed is to make sure >>ECN is enabled on the server side; for example

Re: ECN: Volunteers needed

2001-05-10 Thread Michel Eyckmans (MCE)
> I suspect that the main way to get this thing fixed is to make sure > ECN is enabled on the server side; for example, we have turned on ECN > on kernel.org. If a user is using a broken software stack, it's their > loss, not ours. I agree it's the server side that w

Re: ECN: Volunteers needed

2001-05-10 Thread Holger Lubitz
"H. Peter Anvin" wrote: > I suspect that the main way to get this thing fixed is to make sure > ECN is enabled on the server side; for example, we have turned on ECN > on kernel.org. If a user is using a broken software stack, it's their > loss, not ours. This is wha

ECN bits and ZyXEL routers.

2001-05-09 Thread Roeland Th. Jansen
the reference to zyxel (from Jeff G ?) : >ZyXEL P681 -> firmware v2.50(T.05)b6 | 03/28/2001) btw: it is already offically release version 2.50(T.05)| 04/13/2001 and the ECN issue is fixed. I have asked if the developers would ake actoin on the other routers/firewalls as well to f

Re: ECN: Volunteers needed :: AOL ::: Spam filter

2001-05-09 Thread God
On Wed, 9 May 2001, Gregory Maxwell wrote: > On Wed, May 09, 2001 at 01:08:31PM -0400, God wrote: > > On Wed, 9 May 2001, Gregory Maxwell wrote: > > > > > 2) They certainly are. Every once in a while they go through a period of > > >silently dropping all email coming from hosts that don't h

Re: ECN: Volunteers needed

2001-05-09 Thread Gregory Maxwell
On Wed, May 09, 2001 at 01:08:31PM -0400, God wrote: > On Wed, 9 May 2001, Gregory Maxwell wrote: > > > 2) They certainly are. Every once in a while they go through a period of > >silently dropping all email coming from hosts that don't have PTRs. > >This would be no worse. > > ACK

Re: ECN: Volunteers needed

2001-05-09 Thread H. Peter Anvin
Followup to: <[EMAIL PROTECTED]> By author:God <[EMAIL PROTECTED]> In newsgroup: linux.dev.kernel > > Agreed. For now ECN has been disabled here. I got tired of so many sites > not supporting it that I gave up. Maybe by 2.8.x kernels it will be worth > turning ba

Re: ECN: Volunteers needed

2001-05-09 Thread God
On Wed, 9 May 2001, Gregory Maxwell wrote: > 2) They certainly are. Every once in a while they go through a period of >silently dropping all email coming from hosts that don't have PTRs. >This would be no worse. ACK Which do you mean? : -Hosts that don't have valid PTRs (which wou

Re: ECN: Volunteers needed

2001-05-09 Thread God
[snip] > > > > > > I tried to get my local bank to fix their internet banking service about a > > month ago. I ran into a 'brick wall'. They only support Windows and MacOS, > > since neither currently implement ECN, they don't have a problem :-(

Re: ECN: Volunteers needed

2001-05-09 Thread Gregory Maxwell
On Wed, May 09, 2001 at 10:10:29AM -0400, Horst von Brand wrote: > Gregory Maxwell <[EMAIL PROTECTED]> said: > > [...] > > > Anyone have any friends at AOL? I wonder what the effect on these > > non-conformant sites would be if AOL's proxy's became ECN en

Re: ECN: Volunteers needed

2001-05-09 Thread Horst von Brand
Gregory Maxwell <[EMAIL PROTECTED]> said: [...] > Anyone have any friends at AOL? I wonder what the effect on these > non-conformant sites would be if AOL's proxy's became ECN enabled? And AOL is sure crazy enough to "break compatibility with everybody" just out

Re: ECN: Volunteers needed

2001-05-09 Thread Gregory Maxwell
On Tue, May 08, 2001 at 10:31:23PM -0400, jamal wrote: > Folks, > > ECN is about to become a Proposed Standard RFC. Thanks to > efforts from the Linux community, a few issues were discovered > in the course of deploying the code. Special kudos go to Alexey > Kuznetsov and D

Re: ECN: Volunteers needed

2001-05-09 Thread Pekka Savola
only support Windows and MacOS, > since neither currently implement ECN, they don't have a problem :-( > > The only answer I got is 'we don't support Linux'. The operator tried > to find some one interested in the network, but the answer was always > the same.

Re: ECN: Volunteers needed

2001-05-09 Thread Matthew Geier
olitely using a standard > email ask them that their site was non-conformant. I tried to get my local bank to fix their internet banking service about a month ago. I ran into a 'brick wall'. They only support Windows and MacOS, since neither currently implement ECN, they don

Re: ECN: Volunteers needed

2001-05-08 Thread Billy Harvey
> This was the big argument I was running into from sites, "well it > isn't standard yet, when it is we'll do something about it". The > larger sites like to avoid updates until absolutely necessary. Good grief - nothing like planning ahead ... and these large-site administrators actually acc

Re: ECN: Volunteers needed

2001-05-08 Thread jamal
On Tue, 8 May 2001, jamal wrote: > Any one wishing to volunteer, please still send your emails in -- > we should be ready in a few days from now, > I guess i should have mentioned the IESG is sitting in to approve ECN as proposed standard in about a week or so. cheers, jamal - To un

Re: ECN: Volunteers needed

2001-05-08 Thread jamal
On Tue, 8 May 2001, David S. Miller wrote: > > I believe it would only be prudent to actually send out these messages > starting at the moment ECN is officially standard. > > This was the big argument I was running into from sites, "well it > isn't standard yet, w

Re: ECN: Volunteers needed

2001-05-08 Thread David S. Miller
jamal writes: > Help is needed to contact these site owners and politely using a standard > email ask them that their site was non-conformant. > Point them to Sally's draft and the fact that ECN is becoming standard > in the next week or so. Also to Jeff's ECN-

ECN: Volunteers needed

2001-05-08 Thread jamal
Folks, ECN is about to become a Proposed Standard RFC. Thanks to efforts from the Linux community, a few issues were discovered in the course of deploying the code. Special kudos go to Alexey Kuznetsov and David Miller. I wont go into details of the issues other than to say some midlle-box

Re: Announce: ECN vendor support page

2001-04-25 Thread Drew Bertola
little typo: >From 5. External resources (notice "Congrestion"): Sally Floyd's page on Explicit Congrestion Notification in TCP/IP. http://www.aciri.org/floyd/ecn.html -- Drew Bertola | Send a text message to my pager or cell ... | http://jpager.com/Drew - To unsubscribe

Announce: ECN vendor support page

2001-04-25 Thread Jeff Garzik
To all-- As ECN deployment increases, people are increasingly noticing that some key web sites are still inaccessible when ECN is enabled. A Web site has been created to assist with this transition, with two key features: (1) ECN-related fixes are posted on this Web page, and (2) vendors whose

Re: ECN for servers ?

2001-02-14 Thread James Stevenson
Hi no they should not be effected the place that starts the connection eg send the first SYN has to ask to use ECN if it is not requested it will never be used in that connection In local.linux-kernel-list, you wrote: >Hello, > >What is the impact of enabling ECN on the server side

Re: ECN for servers ?

2001-02-14 Thread Graham Murray
"H. Peter Anvin" <[EMAIL PROTECTED]> writes: > Con: people behind broken firewalls can't connect. Are you sure that is correct? "Servers" normally listen for incoming connections from clients rather than establish them[1]. So, if the server implements ECN the

  1   2   3   4   >