On Thu, 18 Sep 2025 16:50:46 +0800
Tilnel <deng1991...@gmail.com> wrote:

> Hi,
> 
> I found two behaviors different with RFC recommendations in FreeBSD 14.3 TCP
> socket.
> 
> 1. Failure to RST on close with data pending
> According to RFC2525 section 2.17, RST should be sent when close() on socket
> with pending data to read in receive buffer.
> According to RFC1122: A host MAY implement a "half-duplex" TCP close
> sequence, ... cannot continue to read data ... If such a host issues a CLOSE
>           call while received data is still pending in TCP, or if new data is
>           received after CLOSE is called, its TCP SHOULD send a RST to show
> that data was lost.
> It's not the case with FreeBSD TCP socket. Here is TCPDUMP output,
> showing close()
> on socket with pending data emit FIN instead of RST.
>   A > B: Flags [S], seq 2636678338, win 65535, length 0
>   B > A: Flags [S.], seq 1969223298, ack 2636678339, win 65535, length 0
>   A > B: Flags [.], ack 1, win 1277, length 0
>   A > B: Flags [P.], seq 1:6, ack 1, win 1277, length 5
>   B > A: Flags [.], ack 6, win 1277, length 0
>   B > A: Flags [F.], seq 1, ack 6, win 1277, length 0
>   A > B: Flags [.], ack 2, win 1277, length 0
> All close()/shutdown(SHUT_RDWR)/shutdown(SHUT_RD) and both SO_LINGER on or
> off give the same trace. While on Linux the same execution gives this:
>   A > B: Flags [S], seq 2879877684, win 65495, length 0
>   B > A: Flags [S.], seq 1538598692, ack 2879877685, win 65483, length 0
>   A > B: Flags [.], ack 1, win 512, length 0
>   A > B: Flags [P.], seq 1:6, ack 1, win 512, length 5
>   B > A: Flags [.], ack 6, win 512, length 0
>   B > A: Flags [R.], seq 1, ack 6, win 512, length 0

Is the situation from RFC 2525 section 2/17 still applicable to our TCP stack?
I.e. does the connection still hold indefinitely for A after B's close() ?

> 2. Sending RST to segment with old sequence SYN-RECEIVED instead of
> acknowledgement
> According to RFC793 page 69: If an incoming segment is not acceptable, an
> acknowledgement should be sent in reply. (here `should` is not capitalized).
> This should be applied to all states including and after SYN-RECEIVED. But
> it's not the case with FreeBSD TCP socket. I found this with manually
> constructed TCP segment:
>   A > B: Flags [S], seq 1, win 8192, length 0
>   B > A: Flags [S.], seq 4054810353, ack 2, win 65535, length 0
>   A > B: Flags [.], ack 1, win 8192, length 0
>   B > A: Flags [R], seq 4054810354, win 0, length 0
> Expected behavior is to send an empty ack:
>   A > B: Flags [S], seq 1, win 8192, length 0
>   B > A: Flags [S.], seq 3620804602, ack 2, win 65495, length 0
>   A > B: Flags [.], ack 1, win 8192, length 0
>   B > A: Flags [.], ack 1, win 65495, length 0
> Which is the case with Linux.
> 
> Does anyone know why these two violations exist? Did FreeBSD choose not to
> comply with the RFC for a specific reason, or is it simply an implementation
> error?

RFC 9293 still does not capitalize "should" here, therefore it is not a
normative requirement. In fact, I vaguely recall that some anti-DDoS systems
check the liveness of host (not being spoofed SYN) by sending out-of-window
packet and expecting RST while main connection is unaffected.

-- 
WBR, @nuclight

Reply via email to