On Tue, 2004-07-06 11:47:41 -0700, Stephen Hemminger <shemminger@osdl.org> wrote in message <20040706114741.1bf98bbe@dell_ss3.pdx.osdl.net>: > I propose that the following that will avoid sending window scaling that > is big enough to break in these cases unless the tcp_rmem has been increased. > It will keep default configuration from blowing in a corrupt world. I'm not sure if this is the right way to react. I'd think it's okay to give the user the possibility to scale the window so that it works with his b0rk3d firewall, but default behavior should be to do whatever the protocol dictates/allows. We did the same with ECN, and I think that's the way to go. MfG, JBG -- Jan-Benedict Glaw jbglaw@lug-owl.de . +49-172-7608481 "Eine Freie Meinung in einem Freien Kopf | Gegen Zensur | Gegen Krieg fuer einen Freien Staat voll Freier Bürger" | im Internet! | im Irak! ret = do_actions((curr | FREE_SPEECH) & ~(NEW_COPYRIGHT_LAW | DRM | TCPA));
Attachment:
signature.asc
Description: Digital signature