Results 1 to 10 of 10

Hybrid View

  1. #1
    Player
    werewolf_nr's Avatar
    Join Date
    Aug 2013
    Posts
    10
    Character
    R'shin Mokkri
    World
    Siren
    Main Class
    Archer Lv 96
    OK...

    My TCP PDUs are varied checksums, but my outgoing IP packets are all 0x0000, likely because I have a setting wrong somewhere in my network stack (that I've now fixed, Windows was set to offload checksums to hardware but hardware wasn't doing them). However, both successful and failed connections show this, so that isn't it.

    However, tugging on this thread lead me to another thing. The IP packets have the "do not fragment" flag set. So if there is an MTU misconfiguration anywhere in the world between you and the server, the packet never makes it. VPNs would get around this at least partly by hiding the IP packet in another packet that could be fragmented, hopefully bypassing the issue. But... the packets that fail are only ~700 bytes, so it would have to be a horrific misconfiguration for that to be the case. Of course, why it is even that large when the last 500 bytes of the data are all 0s is beyond me.

    While I feel like the "do not fragment" flag is going to cause trouble for some users, it does not at all explain the refusal to respond to pings that happens after Biko Nito and I have problems.

    @Bikonito If you want to give it a shot, try doing running a ping from the command prompt with the -f and -l flags, set the number after -l to something like 1000 and see if the ping fails. Back the number down until they start succeeding.
    (1)

  2. #2
    Player
    werewolf_nr's Avatar
    Join Date
    Aug 2013
    Posts
    10
    Character
    R'shin Mokkri
    World
    Siren
    Main Class
    Archer Lv 96
    I wonder if we're running afoul of some sort of DDOS protections. Like our ISPs (Spectrum for me) are flagged or there is a misconfigured rule somewhere.
    (0)