> On May 20, 2024, at 3:33 AM, Alexander Kokorin <zukimorimk...@gmail.com> 
> wrote:
> 
> We have noticed that when we receive TCP packets with the wrong
> checksum from the internet, on
> the receiving node it goes through, NIC compares the checksum, lets packet
> further and increases the kernel counter for RX ERR. It doesn't make sense
> as nothing can be done with such packets.

Don't be so sure. Years ago when I worked for another company, another team had 
a product that handled networking traffic. Their product dropped packets that 
had bad TCP checksums. There were certain features in some software that simply 
would not work. They spent months trying to figure out why the features only 
didn't work when traffic went through their product. Eventually they finally 
realized that there were always some TCP checksum errors when that software was 
used. They stopped dropping the packets with bad checksums and then it worked 
fine.

Yes, there is (or at least was?) software that abused the TCP checksum to pass 
some other data through the connection. The point of the hardware checksum 
check is to allow software not not have to do it when it is good - to optimize 
the normal case. It is not to drop the bad packets at a lower level, hiding 
them from TCP.

-- 
Mark Rustad (he/him), Ethernet Products Group, Intel Corporation



_______________________________________________
E1000-devel mailing list
E1000-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/e1000-devel
To learn more about Intel Ethernet, visit 
https://community.intel.com/t5/Ethernet-Products/bd-p/ethernet-products

Reply via email to