summaryrefslogtreecommitdiffstats
path: root/sys/netinet/ip_var.h
diff options
context:
space:
mode:
authorsilby <silby@FreeBSD.org>2005-01-02 01:50:57 +0000
committersilby <silby@FreeBSD.org>2005-01-02 01:50:57 +0000
commitc79cd91efc05ca91a24c2adea62738a1e660528a (patch)
treed32dcba0ed701ac7af89b0ca15a86f9f0c2cf9ad /sys/netinet/ip_var.h
parent6bfe519bf0d785388af7342b991f57aba1332cca (diff)
downloadFreeBSD-src-c79cd91efc05ca91a24c2adea62738a1e660528a.zip
FreeBSD-src-c79cd91efc05ca91a24c2adea62738a1e660528a.tar.gz
Port randomization leads to extremely fast port reuse at high
connection rates, which is causing problems for some users. To retain the security advantage of random ports and ensure correct operation for high connection rate users, disable port randomization during periods of high connection rates. Whenever the connection rate exceeds randomcps (10 by default), randomization will be disabled for randomtime (45 by default) seconds. These thresholds may be tuned via sysctl. Many thanks to Igor Sysoev, who proved the necessity of this change and tested many preliminary versions of the patch. MFC After: 20 seconds
Diffstat (limited to 'sys/netinet/ip_var.h')
-rw-r--r--sys/netinet/ip_var.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/sys/netinet/ip_var.h b/sys/netinet/ip_var.h
index b4c99d2..c0da82f 100644
--- a/sys/netinet/ip_var.h
+++ b/sys/netinet/ip_var.h
@@ -159,6 +159,7 @@ extern struct pr_usrreqs rip_usrreqs;
int ip_ctloutput(struct socket *, struct sockopt *sopt);
void ip_drain(void);
+void ip_fini(void *xtp);
int ip_fragment(struct ip *ip, struct mbuf **m_frag, int mtu,
u_long if_hwassist_flags, int sw_csum);
void ip_freemoptions(struct ip_moptions *);
OpenPOWER on IntegriCloud