Your message dated Fri, 24 Sep 2004 16:54:22 +0900
with message-id <[EMAIL PROTECTED]>
and subject line Bug#272983: Please document this problem
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 23 Sep 2004 08:26:58 +0000
>From [EMAIL PROTECTED] Thu Sep 23 01:26:58 2004
Return-path: <[EMAIL PROTECTED]>
Received: from master.debian.org [146.82.138.7] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CAOwM-0003uZ-00; Thu, 23 Sep 2004 01:26:58 -0700
Received: from granat.internetia.pl (ginger.netia.net.pl) [195.114.173.177] 
        by master.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CAOwK-0002P1-00; Thu, 23 Sep 2004 03:26:56 -0500
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Piotr Roszatycki <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: kernel-image-2.6.8-1-686: TCP window scaling and broken router
Bcc: Piotr Roszatycki <[EMAIL PROTECTED]>
X-Mailer: reportbug 2.99.3
Date: Thu, 23 Sep 2004 10:26:55 +0200
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        OUR_MTA_MSGID autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: kernel-image-2.6.8-1-686
Version: 2.6.8-3
Severity: important

Kernel 2.6.8 sets TCP window scaling to 7. It doesn't work with many broken
routers including mine. It is possible to set

net.ipv4.tcp_default_win_scale = 0

in sysctl.conf, but I suggest to prepare the patch which restore old behaviour,
analogical to ECN bit patch.

See http://lwn.net/Articles/92727/


-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (900, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-686
Locale: LANG=pl_PL, LC_CTYPE=pl_PL

Versions of packages kernel-image-2.6.8-1-686 depends on:
ii  coreutils [fileutils]         5.2.1-2    The GNU core utilities
ii  fileutils                     5.2.1-2    The GNU file management utilities 
ii  initrd-tools                  0.1.74     tools to create initrd image for p
ii  module-init-tools             3.1-pre5-7 tools for managing Linux kernel mo

-- no debconf information

---------------------------------------
Received: (at 272983-done) by bugs.debian.org; 24 Sep 2004 07:54:36 +0000
>From [EMAIL PROTECTED] Fri Sep 24 00:54:36 2004
Return-path: <[EMAIL PROTECTED]>
Received: from koto.vergenet.net [210.128.90.7] 
        by spohr.debian.org with smtp (Exim 3.35 1 (Debian))
        id 1CAkua-00081F-00; Fri, 24 Sep 2004 00:54:36 -0700
Received: (qmail 32341 invoked by uid 7100); 24 Sep 2004 07:43:08 -0000
Date: Fri, 24 Sep 2004 16:54:22 +0900
From: Horms <[EMAIL PROTECTED]>
To: Magnus Ekdahl <[EMAIL PROTECTED]>, [EMAIL PROTECTED]
Subject: Re: Bug#272983: Please document this problem
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
X-Cluestick: seven
User-Agent: Mutt/1.5.6+20040722i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

On Fri, Sep 24, 2004 at 09:11:12AM +0200, Magnus Ekdahl wrote:
> reopen 269604
> retitle 269604 Common kernel problems needs to documented
> thanks
> 
> >Ok, I'm betting this is related to #267342.  Please try
> >setting /proc/sys/net/ipv4/tcp_default_win_scale to 0, and see if that
> >fixes things for you.
> 
> I can confirm that setting /proc/sys/net/ipv4/tcp_default_win_scale to 0 
> indeed fixes my problem, i.e. 269604.
> 
> Still, I can't see if it is to be corrected with the closing of 272983.
> 
> Still as I understand the resolution of 272983 
> /proc/sys/net/ipv4/tcp_default_win_scale shouldn't default to 0. In my case 
> that would translate to that the firewall at the other end of my connection 
> is broken.
> 
> Even if that is the case the problem hasn't gone away. Please document the 
> problem, or this will be reported again by the next clueless user.

I am not exactly sure where the appropriate place for such documentation
would be. But if you would like to contribute some please feel free.

This is not a kernel bug, it is a bug in your firewall.
I have reclosed the bug accordingly.

-- 
Horms


Reply via email to