When a FORWARD-TSN-Chunk with a relative high cum-tsn-value is injected then the linux kernel ignores this valid FORWARD-TSN-Chunk. It should instead send an SACK-Chunk where the cum_tsn is equal to the cum_tsn specified in the FORWARD-TSN. Testscript available at: https://github.com/nplab/PR_SCTP_Testsuite/blob/master/forward-tsn/receiver-side-implementation/receiver-side-implementation-11.pkt
Attachment:
signature.asc
Description: PGP signature