From modulus@h24-82-193-81.wp.shawcable.net  Wed Jan  1 01:00:51 2003
Return-Path: <modulus@h24-82-193-81.wp.shawcable.net>
Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125])
	by hub.freebsd.org (Postfix) with ESMTP id 6286737B401
	for <FreeBSD-gnats-submit@freebsd.org>; Wed,  1 Jan 2003 01:00:51 -0800 (PST)
Received: from h24-82-193-81.wp.shawcable.net (h24-82-193-81.wp.shawcable.net [24.82.193.81])
	by mx1.FreeBSD.org (Postfix) with ESMTP id DC60943EB2
	for <FreeBSD-gnats-submit@freebsd.org>; Wed,  1 Jan 2003 01:00:49 -0800 (PST)
	(envelope-from modulus@h24-82-193-81.wp.shawcable.net)
Received: from h24-82-193-81.wp.shawcable.net (smmsp@localhost [127.0.0.1])
	by h24-82-193-81.wp.shawcable.net (8.12.6/8.12.6) with ESMTP id h0191mFa098866
	for <FreeBSD-gnats-submit@freebsd.org>; Wed, 1 Jan 2003 03:01:54 -0600 (CST)
	(envelope-from modulus@h24-82-193-81.wp.shawcable.net)
Received: (from root@localhost)
	by h24-82-193-81.wp.shawcable.net (8.12.6/8.12.6/Submit) id gBV5Vl8p095933;
	Mon, 30 Dec 2002 23:31:47 -0600 (CST)
Message-Id: <200212310531.gBV5Vl8p095933@h24-82-193-81.wp.shawcable.net>
Date: Mon, 30 Dec 2002 23:31:47 -0600 (CST)
From: "Christian S.J. Peron" <maneo@bsdpro.com>
Reply-To: "Christian S.J. Peron" <maneo@bsdpro.com>
To: FreeBSD-gnats-submit@freebsd.org
Cc:
Subject: [patch] Incorrect TCP error specification blackhole(4)	
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         46665
>Category:       docs
>Synopsis:       [patch] Incorrect TCP error specification blackhole(4)
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-doc
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          doc-bug
>Submitter-Id:   current-users
>Arrival-Date:   Wed Jan 01 01:10:01 PST 2003
>Closed-Date:    Wed Jan 01 10:23:54 PST 2003
>Last-Modified:  Wed Jan 01 10:23:54 PST 2003
>Originator:     Christian S.J. Peron
>Release:        FreeBSD 4.7-RELEASE-p2 i386
>Organization:
>Environment:
System: FreeBSD h24-82-193-81 4.7-RELEASE-p2 FreeBSD 4.7-RELEASE-p2 #1: Fri Dec 6 00:00:31 CST 2002 modulus@h24-82-193-81:/usr/src/sys/compile/opcode i386


	
>Description:
	When blackhole(4) explains the default behavior of what happends when
	SYN segments are recieved on ports with no sockets listening, it says
	the system will return an RST packet, which is correct.

	However it reports that the connecting system will see the failure as a 
	"Connection reset by peer" error which would imply the remote machine's 
	connect(2) would have exited with failure and would have ECONNRESET set in
	errno. This is not accurate.

	blackhole(4) should report that the connecting machine will recieve a
	"Connection refused" error or ECONNREFUSED which is more accurate.
 
>How-To-Repeat:
	N/A
>Fix:

--- /usr/src/share/man/man4/blackhole.4.wrong	Mon Dec 30 23:13:15 2002
+++ /usr/src/share/man/man4/blackhole.4	Mon Dec 30 23:13:52 2002
@@ -34,7 +34,7 @@
 Normal behaviour, when a TCP SYN segment is received on a port where
 there is no socket accepting connections, is for the system to return
 a RST segment, and drop the connection.  The connecting system will
-see this as a "Connection reset by peer".  By setting the TCP blackhole
+see this as a "Connection refused".  By setting the TCP blackhole
 MIB to a numeric value of one, the incoming SYN segment
 is merely dropped, and no RST is sent, making the system appear
 as a blackhole.  By setting the MIB value to two, any segment arriving
>Release-Note:
>Audit-Trail:
State-Changed-From-To: open->closed 
State-Changed-By: ceri 
State-Changed-When: Wed Jan 1 10:23:10 PST 2003 
State-Changed-Why:  
Duplicate of docs/46654 

http://www.freebsd.org/cgi/query-pr.cgi?pr=46665 
>Unformatted:
