> On 18. Sep 2025, at 18:35, Tilnel <deng1991...@gmail.com> wrote:
> 
> On Thu, Sep 18, 2025 at 6:25 PM Michael Tuexen
> <michael.tue...@lurchi.franken.de> wrote:
>>> 2. Sending RST to segment with old sequence SYN-RECEIVED instead of
>>> acknowledgement
>>> According to RFC793 page 69: If an incoming segment is not acceptable, an
>>> acknowledgement should be sent in reply. (here `should` is not capitalized).
>>> This should be applied to all states including and after SYN-RECEIVED. But 
>>> it's
>>> not the case with FreeBSD TCP socket. I found this with manually 
>>> constructed TCP
>>> segment:
>>> A > B: Flags [S], seq 1, win 8192, length 0
>>> B > A: Flags [S.], seq 4054810353, ack 2, win 65535, length 0
>>> A > B: Flags [.], ack 1, win 8192, length 0
>>> B > A: Flags [R], seq 4054810354, win 0, length 0
>> I am not sure which scenario are you considering. Could you provide SEG.SEQ
>> for the this TCP segment?
>>> Expected behavior is to send an empty ack:
>>> A > B: Flags [S], seq 1, win 8192, length 0
>>> B > A: Flags [S.], seq 3620804602, ack 2, win 65495, length 0
>>> A > B: Flags [.], ack 1, win 8192, length 0
>>> B > A: Flags [.], ack 1, win 65495, length 0
>>> Which is the case with Linux.
> 
> I'd be happy to explain the scenario in more detail.
> Consider the following TCP handshake sequence:
> 1. Socket A sends a SYN segment: <CTL=SYN><SEQ=x> to Socket B, which is in the
>   TCP_LISTEN state.
> 2. Socket B transitions to TCP_SYN_RECV and responds with
>   <CTL=SYN,ACK><SEQ=y><ACK=x+1>.
> 3. Instead of sending the expected <CTL=ACK><SEQ=x+1><ACK=y+1> to complete the
>   three-way handshake, Socket A incorrectly sends <CTL=ACK><SEQ=x><ACK=y+1>.
> According to the RFC, the appropriate response to such a malformed ACK should 
> be
> an empty ACK segment: <CTL=ACK><SEQ=y+1><ACK=x+1>. After that, Socket B should
> either wait for a valid ACK or retransmit the SYN-ACK if necessary.
> However, in FreeBSD’s current implementation, a RST segment is sent instead:
> <CTL=RST><SEQ=y+1>, which aborts the connection prematurely.
> This behavior appears to deviate from the RFC guidance and may lead to
> unnecessary connection resets in edge cases.
Hi Tilnel,

OK, now I understand your scenario. Let me test it and come back to you.
Give me a day or two.

Best regards
Michael
> Best regards
> Tilnel


Reply via email to