From owner-freebsd-hackers Fri Sep 27 12:38:09 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id MAA01810 for hackers-outgoing; Fri, 27 Sep 1996 12:38:09 -0700 (PDT) Received: from gvr.win.tue.nl (root@gvr.win.tue.nl [131.155.210.19]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id MAA01763 for ; Fri, 27 Sep 1996 12:38:05 -0700 (PDT) Received: by gvr.win.tue.nl (8.6.13/1.53) id VAA02005; Fri, 27 Sep 1996 21:37:52 +0200 From: guido@gvr.win.tue.nl (Guido van Rooij) Message-Id: <199609271937.VAA02005@gvr.win.tue.nl> Subject: Re: patch against SYN floods (RED impl.) To: apg@demos.net (Paul Antonov) Date: Fri, 27 Sep 1996 21:37:52 +0200 (MET DST) Cc: hackers@FreeBSD.org In-Reply-To: from Paul Antonov at "Sep 27, 96 09:47:22 pm" X-Mailer: ELM [version 2.4ME+ PL17 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-hackers@FreeBSD.org X-Loop: FreeBSD.org Precedence: bulk Paul Antonov wrote: > Here's my quick patch for 2.1.0 kernel (although it will fit for > 2.1.5 either) implementing Random Early Drop for tcp listen queues. > I've tested in on SYN attacks with over 1000pps rate, and it works > reasonably well. Seeing your patch: isn't it much quicker to walk down the so_q0 list and get the pcb's from there? -Guido