Re: Blocking outgoing 802.11 ACKs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



iptables has "nth" match extension that matches every n-th packet. It
is described in the man page.
But why would you want to drop ACK packets? That would have negative
impact on your link.

Ivan.

On Wed, Jan 28, 2009 at 12:41 PM, Kostas Pelechrinis
<kpele_ntua@xxxxxxxxx> wrote:
> Hi all,
>
> I have two nodes communicating via their wireless interfaces.  Let us assume that node A sends packets to node B.  Once node B is receiving the packets, he transmits the 802.11 ACK frame.  What I want to do is to prevent node B from sending this ACK frames once every two packets for example.
>
> One indirect way I have thought about is setting the following rule to node B:
>
> iptables -A INPUT -i ath0 -m limit --limit _SPECIFIED-LIMIT_ -s _NODE'S A IP_ -j DROP
>
> However,  I am not sure if this prevents the 802.11 ACKs from being transmitted.  This has to do with the place where the above rule is being enforced.
>
> Do you have any comments or suggestions on how I can achieve what I am trying to?
>
> Thanks,
> Kostas
>
>
>
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@xxxxxxxxxxxxxxx
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
>
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux