Package: ppp
Version: 2.4.4rel-10.1
Severity: important
With a UMTS connection to o2 Germany, connections sometimes dropped. Looking
into that issue with wireshark, I found out that the
connection drops because a TCP package of length 187 + k * 240 bytes (with k in
0,1,...) never makes it to the TCP stack of the
receiver (i.e. the computer where PPP is running). This can be reproduced using
netcat and a 187 byte file.
Analyzing the ppp recording itself using wireshark there are three ppp frames
displayed for that TCP packet: one frame of length 240,
one frame of length 241 and one frame of length 1.
I wasn't able to reproduce this bug using Windows, however I only tried it with
a 187 byte packet, I did not run extensive tests
with variable packet sizes yet.
The used device is a
Bus 004 Device 005: ID 12d1:1003 Huawei Technologies Co., Ltd. E220 HSDPA Modem
/ E270 HSDPA/HSUPA Modem
-- System Information:
Debian Release: 5.0
APT prefers testing
APT policy: (600, 'testing'), (400, 'unstable'), (200, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.26-1-686 (SMP w/1 CPU core)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages ppp depends on:
ii libc6 2.7-18 GNU C Library: Shared libraries
ii libpam-modules1.0.1-5Pluggable Authentication Modules f
ii libpam-runtime1.0.1-5Runtime support for the PAM librar
ii libpam0g 1.0.1-5Pluggable Authentication Modules l
ii libpcap0.80.9.8-5system interface for user-level pa
ii netbase 4.34 Basic TCP/IP networking system
ii procps1:3.2.7-11 /proc file system utilities
ppp recommends no packages.
Versions of packages ppp suggests:
ii iptables 1.4.1.1-3 administration tools for packet fi
-- no debconf information
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org