Your message dated Tue, 14 Nov 2006 16:15:14 +0100
with message-id <[EMAIL PROTECTED]>
and subject line information added to the release notes
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: linux-image-2.6.17-1-686
Version: 2.6.17-4
Severity: important
It is impossible to access the following URL using kernel 2.6.17:
http://icfp06.cs.uchicago.edu/
No data seems to be received, when running Debian's kernel 2.6.17, using any
web brower (Konqueror, Firefox...), or even using telnet:
telnet icfp06.cs.uchicago.edu 80
GET / HTTP/1.1
host: icfp06.cs.uchicago.edu
This problem occurs always and only with that web site (I have found no other
site that triggers that problem), and only when using kernel 2.6.17.
It must be noted that this problem disappears when running a previous kernel
version (I re-tried running at least version 2.6.16 on the same Debian system).
This is not a problem tied to our network configuration: all other users of our
network can access that URL without problem, using any other OS.
This is not a hardware problem: when running kernel 2.6.16 or Windows XP on the
same hardware, I have no problem.
Running ethereal, I observed that the HTTP TCP data is actually received, but
seems dropped by the kernel before being delivered to the client process
(browser or telnet).
If you can't reproduce that problem, please tell me what additional information
you would need.
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (990, 'unstable'), (500, 'testing')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.17-1-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=ja_JP.UTF-8 (charmap=UTF-8)
Versions of packages linux-image-2.6.17-1-686 depends on:
ii initramfs-tools [linux-initra 0.73 tools for generating an initramfs
ii module-init-tools 3.2.2-3 tools for managing Linux kernel mo
Versions of packages linux-image-2.6.17-1-686 recommends:
ii libc6-i686 2.3.6-16 GNU C Library: Shared libraries [i
-- debconf information:
linux-image-2.6.17-1-686/preinst/bootloader-initrd-2.6.17-1-686: true
linux-image-2.6.17-1-686/postinst/old-dir-initrd-link-2.6.17-1-686: true
linux-image-2.6.17-1-686/postinst/bootloader-test-error-2.6.17-1-686:
linux-image-2.6.17-1-686/postinst/create-kimage-link-2.6.17-1-686: true
linux-image-2.6.17-1-686/postinst/old-initrd-link-2.6.17-1-686: true
linux-image-2.6.17-1-686/postinst/kimage-is-a-directory:
linux-image-2.6.17-1-686/preinst/lilo-has-ramdisk:
linux-image-2.6.17-1-686/postinst/depmod-error-2.6.17-1-686: false
linux-image-2.6.17-1-686/prerm/removing-running-kernel-2.6.17-1-686: true
linux-image-2.6.17-1-686/postinst/old-system-map-link-2.6.17-1-686: true
linux-image-2.6.17-1-686/preinst/elilo-initrd-2.6.17-1-686: true
linux-image-2.6.17-1-686/preinst/overwriting-modules-2.6.17-1-686: true
linux-image-2.6.17-1-686/preinst/already-running-this-2.6.17-1-686:
linux-image-2.6.17-1-686/preinst/abort-overwrite-2.6.17-1-686:
linux-image-2.6.17-1-686/postinst/bootloader-error-2.6.17-1-686:
linux-image-2.6.17-1-686/preinst/lilo-initrd-2.6.17-1-686: true
linux-image-2.6.17-1-686/preinst/failed-to-move-modules-2.6.17-1-686:
linux-image-2.6.17-1-686/preinst/initrd-2.6.17-1-686:
linux-image-2.6.17-1-686/postinst/depmod-error-initrd-2.6.17-1-686: false
linux-image-2.6.17-1-686/preinst/abort-install-2.6.17-1-686:
linux-image-2.6.17-1-686/prerm/would-invalidate-boot-loader-2.6.17-1-686: true
--- End Message ---
--- Begin Message ---
Hi,
thanks for your bug report. I added now to the release notes this section:
<sect1 id="window-scaling"><heading>Certain networking site cannot be
reached by TCP</heading>
<p>
Since 2.6.17, Linux uses TCP window scaling which is specified in RFC
1323 in
an aggressive way. Some servers have a broken behaviour, and announce
wrong
window sizes for themself. Please see the bugs
<url id="http://bugs.debian.org/381262" name="#381262"> and
<url id="http://bugs.debian.org/395066" name="#395066">
for more information.
</p>
If you think more information should be added, please feel free to
reopen this bug report.
Cheers,
Andi
--
http://home.arcor.de/andreas-barth/
--- End Message ---