[92117] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP receive window set to 0; DoS or not?

daemon@ATHENA.MIT.EDU (billn@billn.net)
Thu Sep 7 18:03:12 2006

Date: Thu, 7 Sep 2006 15:04:58 -0700 (MST)
From: billn@billn.net
To: Travis Hassloch <travis.hassloch@rackspace.com>
Cc: nanog@merit.edu
In-Reply-To: <45008F91.9010304@rackspace.com>
Errors-To: owner-nanog@merit.edu




> I've been seeing some systems that stop serving pages, and I also see
> the Linux "Treason Uncloaked!" kernel messages that indicate a remote
> system reduced its rcv win from 1 to 0... is there a non-malicious
> explanation for this, aside from a remote host running out of socket
> buffers?  Seems to happen too often for that to be the case, and
> my googling has shown that it may be outside of spec.  Certainly
> the warning is clear enough...

I've seen this, quite a bit, on some heavy traffic web clusters. Some 
impolite web browsers will shrink the TCP window to kill the socket 
connection instead of a proper fin/reset. 

- billn

home help back first fref pref prev next nref lref last post