summaryrefslogtreecommitdiffstats
path: root/sys/netinet/tcp_input.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* correct RST validity checking; fc@parkone.ci.oakland.ca.usderaadt1997-11-121-4/+4
|
* indentderaadt1997-11-121-22/+16
|
* indentderaadt1997-08-261-5/+5
|
* Just some more debugging info.angelos1997-08-161-3/+3
|
* SYN flood protection, by specifyingangelos1997-08-091-2/+151
| | | | | | | | option TCPCOOKIE in the kernel config file. For very busy servers, consider raising the TCK_NFRIENDS value (it's currenly set to 16). Code originally from Matt Blaze and John Ioannidis.
* unsigned calc should be signed; jdp@polstra.com; freebsd pr#3998deraadt1997-07-061-2/+2
|
* ensure RST is within window; avalon@coombs.anu.edu.auderaadt1997-06-101-20/+26
|
* arghderaadt1997-05-121-3/+5
|
* use arc4random()deraadt1997-02-051-2/+3
|
* Drop unused variableniklas1996-09-251-2/+2
|
* `solve' the syn bomb problem as well as currently known; add sysctl's forderaadt1996-09-201-5/+58
| | | | | | SOMAXCONN (kern.somaxconn), SOMINCONN (kern.sominconn), and TCPTV_KEEP_INIT (net.inet.tcp.keepinittime). when this is not enough (ie. overfull), start doing tail drop, but slightly prefer the same port.
* Partial protection from TCP SYN attackstholo1996-08-071-2/+3
|
* Remove random() prototype, as it's not needed. Besides it was wrong for the alpha :-)niklas1996-07-291-4/+1
|
* Make TCP ISS increment by random amountstholo1996-07-291-1/+8
|
* From NetBSD: 960217 mergeniklas1996-03-031-29/+37
|
* from netbsd:deraadt1995-12-141-39/+57
| | | | | | | | | make netinet work on systems where pointers and longs are 64 bits (like the alpha). Biggest problem: IP headers were overlayed with structure which included pointers, and which therefore didn't overlay properly on 64-bit machines. Solution: instead of threading pointers through IP header overlays, add a "queue element" structure to do the threading, and point it at the ip headers.
* initial import of NetBSD treederaadt1995-10-181-0/+1641