Date: Sun, 2 Jan 2005 01:50:57 +0000 (UTC) From: Mike Silbersack <silby@FreeBSD.org> To: src-committers@FreeBSD.org, cvs-src@FreeBSD.org, cvs-all@FreeBSD.org Subject: cvs commit: src/sys/netinet in_pcb.c in_pcb.h ip_input.c ip_var.h Message-ID: <200501020150.j021ovpg071890@repoman.freebsd.org>
next in thread | raw e-mail | index | archive | help
silby 2005-01-02 01:50:57 UTC FreeBSD src repository Modified files: sys/netinet in_pcb.c in_pcb.h ip_input.c ip_var.h Log: Port randomization leads to extremely fast port reuse at high connection rates, which is causing problems for some users. To retain the security advantage of random ports and ensure correct operation for high connection rate users, disable port randomization during periods of high connection rates. Whenever the connection rate exceeds randomcps (10 by default), randomization will be disabled for randomtime (45 by default) seconds. These thresholds may be tuned via sysctl. Many thanks to Igor Sysoev, who proved the necessity of this change and tested many preliminary versions of the patch. MFC After: 20 seconds Revision Changes Path 1.157 +52 -4 src/sys/netinet/in_pcb.c 1.79 +2 -0 src/sys/netinet/in_pcb.h 1.293 +14 -0 src/sys/netinet/ip_input.c 1.93 +1 -0 src/sys/netinet/ip_var.h
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200501020150.j021ovpg071890>