Date: Tue, 01 Sep 2015 21:54:03 -0700 From: Rui Paulo <rpaulo@me.com> To: Patrick Kelsey <pkelsey@freebsd.org>, "freebsd-net@freebsd.org" <freebsd-net@freebsd.org> Cc: jones@sdf.org, sara@sinodun.com Subject: Re: TCP Fast Open (RFC7413) for FreeBSD Message-ID: <1441169643.1183.12.camel@me.com> In-Reply-To: <CAD44qMVK82rB_MM_fsFt7LXV%2BuwCFj3%2B9BXXj=30teUQs0gzrg@mail.gmail.com> References: <CAD44qMVK82rB_MM_fsFt7LXV%2BuwCFj3%2B9BXXj=30teUQs0gzrg@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 2015-09-01 at 21:19 -0400, Patrick Kelsey wrote: > Hi, > > About two weeks from now, I will be starting work on server-side TCP > Fast > Open (TFO) support for FreeBSD head and stable/10, with the intention > of > having patches up for review by November. This message is an attempt > to > uncover any existing work on TFO for FreeBSD, as the existence of > such work > may change my plans. > > Copying Sara Dickinson and Tom Jones due to this thread: > https://lists.freebsd.org/pipermail/freebsd-net/2015 > -January/040910.html. Have you performed any measurements on the likelihood that stateful packet inspectors (firewalls, NATs, etc.) will allow a SYN or a SYN/ACK to pass with data in it? How would this interact with our syncache? Does it just need to store the cookie? -- Rui Paulo
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1441169643.1183.12.camel>