Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 01 Sep 2015 21:54:03 -0700
From:      Rui Paulo <rpaulo@me.com>
To:        Patrick Kelsey <pkelsey@freebsd.org>, "freebsd-net@freebsd.org" <freebsd-net@freebsd.org>
Cc:        jones@sdf.org, sara@sinodun.com
Subject:   Re: TCP Fast Open (RFC7413) for FreeBSD
Message-ID:  <1441169643.1183.12.camel@me.com>
In-Reply-To: <CAD44qMVK82rB_MM_fsFt7LXV%2BuwCFj3%2B9BXXj=30teUQs0gzrg@mail.gmail.com>
References:  <CAD44qMVK82rB_MM_fsFt7LXV%2BuwCFj3%2B9BXXj=30teUQs0gzrg@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 2015-09-01 at 21:19 -0400, Patrick Kelsey wrote:
> Hi,
> 
> About two weeks from now, I will be starting work on server-side TCP 
> Fast
> Open (TFO) support for FreeBSD head and stable/10, with the intention 
> of
> having patches up for review by November.  This message is an attempt 
> to
> uncover any existing work on TFO for FreeBSD, as the existence of 
> such work
> may change my plans.
> 
> Copying Sara Dickinson and Tom Jones due to this thread:
> https://lists.freebsd.org/pipermail/freebsd-net/2015
> -January/040910.html.

Have you performed any measurements on the likelihood that stateful
packet inspectors (firewalls, NATs, etc.) will allow a SYN or a SYN/ACK
to pass with data in it?

How would this interact with our syncache?  Does it just need to store
the cookie?

-- 
Rui Paulo



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1441169643.1183.12.camel>