Subject: www.netbsd.org && frags?
To: None <port-sparc64@netbsd.org>
From: Adam Bozanich <abozan01@ccsf.edu>
List: port-sparc64
Date: 07/30/2003 20:32:07
Hi all.  Whenever I try to http://www.netbsd.org, ipfilter drops packets
with this:

Jul 30 12:57:59 temple ipmon[111]: 12:57:58.931317 dc0 @0:7 b 204.152.184.116 ->
192.168.x.x PR tcp len 20 (164) frag 144@1336 IN

I believe that this line is grabbing it:

block in log body quick all with short                          head 10

Or maybe it's from default drop.

For some reason I _ONLY_ have this problem with netbsd.org

Does anybody have information on the dangers of letting in these
fragments?

It looks like two packets come with every attempt:

204.152.184.116 -> 192.168.1.100 TCP TTL:53 TOS:0x0 ID:17939 IpLen:20
DgmLen:1356 MF
Frag Offset: 0x0000   Frag Size: 0x0014

204.152.184.116 -> 192.168.1.100 TCP TTL:53 TOS:0x0 ID:17939 IpLen:20
DgmLen:164
Frag Offset: 0x00A7   Frag Size: 0x0014


Am I just being paranoid by droping these? Why only netbsd.org giving
this to me?

-Adam Bozanich