As quoted from the Neohapsis forums: ***BEGIN*** > I was looking at my logs this morning and found the two following > lines inside: Aug 1 16:38:10 mydotcom kernel: TCP: Treason > uncloaked! Peer 24.200.94.63:37331/80 shrinks window > 3176552165:3176564729. Repaired. Aug 1 16:38:14 mydotcom kernel: > TCP: Treason uncloaked! Peer 24.200.94.63:37331/80 shrinks window > 3176552165:3176564729. Repaired. I don' t know what those two > lines mean but I know who had this ip at this moment. Does > anybody knows what this is and what I should do about it? Thank > You Marc <em>The conquering penguin of the tribe of UNIX</em>
Its logging a tcp protocol violation by the other end. Window shrinking isnt allowed in the spec.. ***END*** Looks harmless to me, though I, too, do not like the Treason Uncloaked! language. Sounds menacing :P and I don't like that... HTH On Sun, 5 May 2002 10:45:20 -0400 Sys Admin <[EMAIL PROTECTED]> (by way of Douglas J Hunley <[EMAIL PROTECTED]>) wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > got this in the logs this morning? wtf? > > Unusual System Events > =-=-=-=-=-=-=-=-=-=-= > May 5 04:54:01 linux-sxs kernel: TCP: Treason uncloaked! Peer > 61.131.162.148:38264/80 shrinks window 1022530692:1022531292. Repaired. May > 5 04:54:26 linux-sxs kernel: TCP: Treason uncloaked! Peer > 61.131.162.148:38264/80 shrinks window 1022539452:1022542972. Repaired. > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.7 (GNU/Linux) > > iD8DBQE81UWASrrWWknCnMIRAh4oAJ4jdf7+bc/eX/os15h0tIpkWWPggQCePRsb > /CvhN7Rtzi335+LH94zZBv8= > =eMJt > -----END PGP SIGNATURE----- > > > _______________________________________________ > Linux-users mailing list - http://linux-sxs.org/mailman/listinfo/linux-users > Subscribe/Unsubscribe info, Archives,and Digests are located at the above URL. -- Tyler Regas PHM Editor-in-Chief [EMAIL PROTECTED] _______________________________________________ Linux-users mailing list - http://linux-sxs.org/mailman/listinfo/linux-users Subscribe/Unsubscribe info, Archives,and Digests are located at the above URL.
