Atul Kumar wrote:
input1: USB HID v1.10 Mouse [Avocent Avocent DSRIQ-USB] on usb1:4.1
TCP: Treason uncloaked! Peer 202.174.144.226:25/42706 shrinks window
3664835727:3664841567. Repaired.
TCP: Treason uncloaked! Peer 67.113.236.101:25/40065 shrinks window
TCP: Treason uncloaked! Peer 67.113.236.101:25/46663 shrinks window
471513197:471513202. Repaired.
TCP: Treason uncloaked! Peer 67.113.236.101:25/46663 shrinks window
471513197:471513202. Repaired.
I've recieved some of these messages on my server I'm doing my own
investigations.
Anyone had this or know how to protect against it?

You are getting DOS'ed or DDOS'ed using a fairly old and commom practice. Window shrinking is not allowed in the TCP/IP specification.
I think the new kernel can handle this nastiness. There is nothing to worry about. consider it just as a log message.


From /usr/src/linux/net/ipv4/tcp_timer.c:

if (tp->snd_wnd == 0 && !sk->dead &&
!((1<<sk->state)&(TCPF_SYN_SENT|TCPF_SYN_RECV))) {
/* Receiver dastardly shrinks window. Our retransmits
* become zero probes, but we should not timeout this
* connection. If the socket is an orphan, time it out,
* we cannot allow such beasts to hang infinitely.
*/
#ifdef TCP_DEBUG
if (net_ratelimit())
printk(KERN_DEBUG "TCP: Treason uncloaked! Peer
%u.%u.%u.%u:%u/%u shrinks window %u:%u. Repaired.\n",
NIPQUAD(sk->daddr), htons(sk->dport), sk->num,
tp->snd_una, tp->snd_nxt);
#endif


--
( 2b || !2b)

_______________________________________________
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/

Reply via email to