Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-users: Re: [Wireshark-users] Window scaling

From: ronnie sahlberg <ronniesahlberg@xxxxxxxxx>
Date: Mon, 6 Jun 2016 08:37:06 -0700
On Mon, Jun 6, 2016 at 8:31 AM, Robert Dahlem <Robert.Dahlem@xxxxxxx> wrote:
>
> On 01.06.2016 21:01, Jim Aragon wrote:
>
>> As Chris pointed out, packets with the SYN bit set are never scaled, so
>> the window size value and the calculated window size are the same, but f
>> you look farther down in the captured packets, past the SYN and SYN/ACK,
>> you will see that the calculated window size is the number in the window
>> size value field multiplied by the scale factor.
>
>
> I do not agree with the statement that packets with the SYN bit set are
> never scaled.

The standard is pretty clear for this case.



RFC1323 : https://www.ietf.org/rfc/rfc1323.txt section 2.2

"""
The Window field in a SYN (i.e., a <SYN> or <SYN,ACK>) segment
itself is never scaled.
"""

> In this particular case the SYN/ACK packet is the only one
> the client ever sees from the server until the problem shows up. So
> sure, the window that the server opens to the client is scaled at this
> moment.
>
> Anyway, I finally came down to the bottom of this: my system is a SLES
> 11 SP4 with a Linux kernel 3.0.101, a pretty old one. From what I read
> there might be a problem with the kernels view on window scaling. But
> one can tell the kernel to ignore out-of-window packets with
>
>         sysctl -w net.netfilter.nf_conntrack_tcp_be_liberal = 1
>
> Kind regards,
> Robert
> ___________________________________________________________________________
> Sent via:    Wireshark-users mailing list <wireshark-users@xxxxxxxxxxxxx>
> Archives:    https://www.wireshark.org/lists/wireshark-users
> Unsubscribe: https://wireshark.org/mailman/options/wireshark-users
>              mailto:wireshark-users-request@xxxxxxxxxxxxx?subject=unsubscribe