From owner-freebsd-hackers Fri May 22 16:33:21 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id QAA14911 for freebsd-hackers-outgoing; Fri, 22 May 1998 16:33:21 -0700 (PDT) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from dt050n33.san.rr.com (@dt053nd2.san.rr.com [204.210.34.210]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id QAA14828 for ; Fri, 22 May 1998 16:32:55 -0700 (PDT) (envelope-from Studded@san.rr.com) Received: from san.rr.com (Studded@localhost [127.0.0.1]) by dt050n33.san.rr.com (8.8.8/8.8.8) with ESMTP id QAA10551; Fri, 22 May 1998 16:32:16 -0700 (PDT) (envelope-from Studded@san.rr.com) Message-ID: <35660AFF.1E191CC6@san.rr.com> Date: Fri, 22 May 1998 16:32:15 -0700 From: Studded Organization: Triborough Bridge & Tunnel Authority X-Mailer: Mozilla 4.05 [en] (X11; I; FreeBSD 2.2.6-STABLE-0507 i386) MIME-Version: 1.0 To: Niall Smart CC: hackers@FreeBSD.ORG Subject: Re: tcp states and sysctl's References: Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Niall Smart wrote: > > Hi, > > I don't think a shutdown(2) sysctl is necessary. > > a) the BSD stack is currently compliant in this regard, if > anything need's changing it's the client. Finger-pointing doesn't help. If there is a problem we can deal with at the server level I want to be able to deal with it. > b) no-one has produced any evidence to show that all > these sockets in TIME_WAIT_2 are actully having a > negative impact in performance on the system. Actually, > I would seriously hope not, because otherwise this > is a relatively easy DoS. (Though probably not as > effective as a SYN flood.) My main concern is fd's right now (mostly due to a project I'm working on :). When exactly does the fd associated with a connection like this get allocated and when does it get released? Doug -- *** Chief Operations Officer, DALnet IRC network *** *** Proud designer and maintainer of one of the world's largest *** Internet Relay Chat server with 5,328 simultaneous connections *** Try spider.dal.net on ports 6662-4 (Powered by FreeBSD) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message