From 67931eee29c1243cda8edab749e0053a487358b5 Mon Sep 17 00:00:00 2001 From: pst Date: Tue, 9 Apr 1996 07:01:53 +0000 Subject: Logging UDP and TCP connection attempts should not be enabled by default. It's trivial to create a denial of service attack on a box so enabled. These messages, if enabled at all, must be rate-limited. (!) --- sys/netinet/tcp_input.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'sys/netinet/tcp_input.c') diff --git a/sys/netinet/tcp_input.c b/sys/netinet/tcp_input.c index 17e0df4..270abcd 100644 --- a/sys/netinet/tcp_input.c +++ b/sys/netinet/tcp_input.c @@ -31,7 +31,7 @@ * SUCH DAMAGE. * * @(#)tcp_input.c 8.12 (Berkeley) 5/24/95 - * $Id: tcp_input.c,v 1.40 1996/03/25 20:13:21 wollman Exp $ + * $Id: tcp_input.c,v 1.41 1996/04/04 10:46:39 phk Exp $ */ #ifndef TUBA_INCLUDE @@ -77,7 +77,7 @@ struct tcpstat tcpstat; SYSCTL_STRUCT(_net_inet_tcp, TCPCTL_STATS, stats, CTLFLAG_RD, &tcpstat , tcpstat, ""); -static int log_in_vain = 1; +static int log_in_vain = 0; SYSCTL_INT(_net_inet_tcp, OID_AUTO, log_in_vain, CTLFLAG_RW, &log_in_vain, 0, ""); -- cgit v1.1