WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-bugs

[Xen-bugs] [Bug 495] Port-forwarding in Dom0 causes corrupt TCP checksum

To: xen-bugs@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-bugs] [Bug 495] Port-forwarding in Dom0 causes corrupt TCP checksums in DomU
From: bugzilla-daemon@xxxxxxxxxxxxxxxxxxx
Date: Wed, 08 Feb 2006 15:13:12 +0000
Delivery-date: Wed, 08 Feb 2006 15:34:01 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-bugs-request@lists.xensource.com?subject=help>
List-id: Xen Bugzilla <xen-bugs.lists.xensource.com>
List-post: <mailto:xen-bugs@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-bugs>, <mailto:xen-bugs-request@lists.xensource.com?subject=unsubscribe>
Reply-to: bugs@xxxxxxxxxxxxxxxxxx
Sender: xen-bugs-bounces@xxxxxxxxxxxxxxxxxxx
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=495


rich@xxxxxxxxxxx changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |rich@xxxxxxxxxxx




------- Additional Comments From rich@xxxxxxxxxxx  2006-02-08 15:13 -------
I have this bug too, with a Xen unstable nightly tarball downloaded on 
2006/02/02.

Here is a tcpdump of a simple TCP connection made from a domU.  Note that the
initial 3 way handshake goes OK, but thereafter all TCP packets have a bad 
checksum.

tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
15:18:47.955933 IP (tos 0x10, ttl  63, id 55208, offset 0, flags [DF], length:
60) 192.168.2.250.4361 > 80.68.91.176.80: S [tcp sum ok] 87812993:87812993(0)
win 5840 <mss 1460,sackOK,timestamp 146473 0,nop,wscale 2>
15:18:47.989850 IP (tos 0x0, ttl  55, id 0, offset 0, flags [DF], length: 60)
80.68.91.176.80 > 192.168.2.250.4361: S [tcp sum ok] 2338351:2338351(0) ack
87812994 win 5792 <mss 1460,sackOK,timestamp 164554683 146473,nop,wscale 0>
15:18:47.990004 IP (tos 0x10, ttl  63, id 55209, offset 0, flags [DF], length:
52) 192.168.2.250.4361 > 80.68.91.176.80: . [tcp sum ok] 1:1(0) ack 1 win 1460
<nop,nop,timestamp 146482 164554683>
15:18:51.900292 IP (tos 0x10, ttl  63, id 55210, offset 0, flags [DF], length:
68) 192.168.2.250.4361 > 80.68.91.176.80: P [bad tcp cksum fe8b (->4dca)!]
1:17(16) ack 1 win 1460 <nop,nop,timestamp 147460 164554683>
15:18:52.134882 IP (tos 0x10, ttl  63, id 55211, offset 0, flags [DF], length:
68) 192.168.2.250.4361 > 80.68.91.176.80: P [bad tcp cksum fe8b (->4d8f)!]
1:17(16) ack 1 win 1460 <nop,nop,timestamp 147519 164554683>
15:18:52.606902 IP (tos 0x10, ttl  63, id 55212, offset 0, flags [DF], length:
68) 192.168.2.250.4361 > 80.68.91.176.80: P [bad tcp cksum fe8b (->4d19)!]
1:17(16) ack 1 win 1460 <nop,nop,timestamp 147637 164554683>
15:18:53.550959 IP (tos 0x10, ttl  63, id 55213, offset 0, flags [DF], length:
68) 192.168.2.250.4361 > 80.68.91.176.80: P [bad tcp cksum fe8b (->4c2d)!]
1:17(16) ack 1 win 1460 <nop,nop,timestamp 147873 164554683>
15:18:55.567116 IP (tos 0x10, ttl  63, id 55214, offset 0, flags [DF], length:
68) 192.168.2.250.4361 > 80.68.91.176.80: P [bad tcp cksum fe8b (->4a35)!]
1:17(16) ack 1 win 1460 <nop,nop,timestamp 148377 164554683>
15:18:59.583385 IP (tos 0x10, ttl  63, id 55215, offset 0, flags [DF], length:
68) 192.168.2.250.4361 > 80.68.91.176.80: P [bad tcp cksum fe8b (->4649)!]
1:17(16) ack 1 win 1460 <nop,nop,timestamp 149381 164554683>
15:19:07.135834 IP (tos 0x10, ttl  63, id 55216, offset 0, flags [DF], length:
68) 192.168.2.250.4361 > 80.68.91.176.80: P [bad tcp cksum fe8b (->3ee9)!]
1:17(16) ack 1 win 1460 <nop,nop,timestamp 151269 164554683>
15:19:22.240792 IP (tos 0x10, ttl  63, id 55217, offset 0, flags [DF], length:
68) 192.168.2.250.4361 > 80.68.91.176.80: P [bad tcp cksum fe8b (->3029)!]
1:17(16) ack 1 win 1460 <nop,nop,timestamp 155045 164554683>

I am using the standard NAT scripts.

Rich (rich at annexia dot org)

-- 
Configure bugmail: 
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs

<Prev in Thread] Current Thread [Next in Thread>