| Summary: | KDEconnect v1.18 on Android12: TCP connection to server port 1716 violates TCP rules for segment size and termination sequence | ||
|---|---|---|---|
| Product: | [Applications] kdeconnect | Reporter: | Riegler Bernhard <riegler.b> |
| Component: | android-application | Assignee: | Albert Vaca Cintora <albertvaka> |
| Status: | REPORTED --- | ||
| Severity: | normal | CC: | valdikss |
| Priority: | NOR | ||
| Version First Reported In: | unspecified | ||
| Target Milestone: | --- | ||
| Platform: | Android | ||
| OS: | Android 11.x | ||
| Latest Commit: | Version Fixed/Implemented In: | ||
| Sentry Crash Report: | |||
|
Description
Riegler Bernhard
2021-12-14 09:15:05 UTC
>next is a TCPconnection started from Android12 KDEconnect_v1.18, both sides report in the SYN segment TCP MSS=1460
>next is a TCP violation sending a TCP payload of 1860 bytes.
This should not be possible. Wireshark has protocol reassembling enabled by default, as well as the network card driver could use Generic Receive Offload.
Are you sure of your observations? Care to provide .pcaps?
you are correct. I was tricked by looking at the data content in wireshark, which is the same as UDP just before. the TCP segments are correct just after the 3-way handshake. (MSS=1460) I cannot tell if the wireshark config was wrong or the TCP-offloading to HW was switched on (LRO) but the TCP finish behaviour is still valid. the android side (KDEconnect) send TCP ACK flag, but no FIN or RST flag. |