Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 2 Jan 2005 01:50:57 +0000 (UTC)
From:      Mike Silbersack <silby@FreeBSD.org>
To:        src-committers@FreeBSD.org, cvs-src@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: src/sys/netinet in_pcb.c in_pcb.h ip_input.c ip_var.h
Message-ID:  <200501020150.j021ovpg071890@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
silby       2005-01-02 01:50:57 UTC

  FreeBSD src repository

  Modified files:
    sys/netinet          in_pcb.c in_pcb.h ip_input.c ip_var.h 
  Log:
  Port randomization leads to extremely fast port reuse at high
  connection rates, which is causing problems for some users.
  
  To retain the security advantage of random ports and ensure
  correct operation for high connection rate users, disable
  port randomization during periods of high connection rates.
  
  Whenever the connection rate exceeds randomcps (10 by default),
  randomization will be disabled for randomtime (45 by default)
  seconds.  These thresholds may be tuned via sysctl.
  
  Many thanks to Igor Sysoev, who proved the necessity of this
  change and tested many preliminary versions of the patch.
  
  MFC After:      20 seconds
  
  Revision  Changes    Path
  1.157     +52 -4     src/sys/netinet/in_pcb.c
  1.79      +2 -0      src/sys/netinet/in_pcb.h
  1.293     +14 -0     src/sys/netinet/ip_input.c
  1.93      +1 -0      src/sys/netinet/ip_var.h



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200501020150.j021ovpg071890>