Dropping TCP options from retransmitted SYNs considered harmful
Jason Wolfe
nitroboost at gmail.com
Sat Oct 13 22:19:10 UTC 2012
On Fri, Oct 12, 2012 at 9:13 AM, John Baldwin <jhb at freebsd.org> wrote:
> Back in 2001 FreeBSD added a hack to strip TCP options from retransmitted SYNs
> starting with the 3rd SYN in this block in tcp_timer.c:
>
> /*
> * Disable rfc1323 if we haven't got any response to
> * our third SYN to work-around some broken terminal servers
> * (most of which have hopefully been retired) that have bad VJ
> * header compression code which trashes TCP segments containing
> * unknown-to-them TCP options.
> */
> if ((tp->t_state == TCPS_SYN_SENT) && (tp->t_rxtshift == 3))
> tp->t_flags &= ~(TF_REQ_SCALE|TF_REQ_TSTMP);
>
> There is even a PR for the original bug report: kern/1689
>
> [..snip..]
>
> The original motivation of this change is to work around broken terminal
> servers that were old when this change was added in 2001. Over 10 years later
> I think we should at least have an option to turn this work-around off, and
> possibly disable it by default.
>
> Thoughts?
>
> --
> John Baldwin
Not that it alone merits keeping the code in, but there are some cases
where this comes in handy. I ran into an issue with heavily
trafficked Linux <-> FBSD boxes here -
http://lists.freebsd.org/pipermail/freebsd-net/2012-March/031881.html.
Linux would deny the connection because in FBSD ithe n and outbound
timestamp randomization isn't sync'd to the same base, so when FBSD
would hit a 2MSL connection Linux would simply ignore the SYN. After
the 3rd SYN FBSD would drop support, and Linux would finally honor the
request. I doubt this is too widespread, but it would probably break
things for a few folks.
Jason
More information about the freebsd-net
mailing list