diff options
author | 2000-07-06 10:11:21 +0000 | |
---|---|---|
committer | 2000-07-06 10:11:21 +0000 | |
commit | f6e5559941d2bc223ffe9c1b93149ebdfc1f0f3a (patch) | |
tree | 81547a32d4d546a2c0faf6e70de292af312440bf /sys/netinet/tcp_input.c | |
parent | Don't write password lines longer than 1023 chars. (diff) | |
download | wireguard-openbsd-f6e5559941d2bc223ffe9c1b93149ebdfc1f0f3a.tar.xz wireguard-openbsd-f6e5559941d2bc223ffe9c1b93149ebdfc1f0f3a.zip |
- more icmp6/ip6 stats.
- protect IPv6 ND from being hosed (due to neighbor unreachability detection
hint) by wrong tcp traffic. still not sure if there's real attack, but
it is good to be cautious.
- avoid bitfield for router renumbering header decl.
- implement packet-per-sec limitation for icmp6 errors, turn interval
limit off (it is not very useful due to unix timer resolution).
Diffstat (limited to 'sys/netinet/tcp_input.c')
-rw-r--r-- | sys/netinet/tcp_input.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/sys/netinet/tcp_input.c b/sys/netinet/tcp_input.c index 2573758c63e..a992d9f6534 100644 --- a/sys/netinet/tcp_input.c +++ b/sys/netinet/tcp_input.c @@ -1,4 +1,4 @@ -/* $OpenBSD: tcp_input.c,v 1.63 2000/07/06 05:24:45 itojun Exp $ */ +/* $OpenBSD: tcp_input.c,v 1.64 2000/07/06 10:11:22 itojun Exp $ */ /* $NetBSD: tcp_input.c,v 1.23 1996/02/13 23:43:44 christos Exp $ */ /* @@ -124,7 +124,7 @@ do { \ if (tp && tp->t_inpcb && (tp->t_inpcb->inp_flags & INP_IPV6) \ && !(tp->t_inpcb->inp_flags & INP_IPV6_MAPPED) \ && tp->t_inpcb->inp_route6.ro_rt) { \ - nd6_nud_hint(tp->t_inpcb->inp_route6.ro_rt, NULL); \ + nd6_nud_hint(tp->t_inpcb->inp_route6.ro_rt, NULL, 0); \ } \ } while (0) #else |