diff options
author | Eric Dumazet <edumazet@google.com> | 2012-07-17 10:13:05 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2012-07-17 01:36:20 -0700 |
commit | 282f23c6ee343126156dd41218b22ece96d747e3 (patch) | |
tree | 9a306d99ed77d760078d29699edd3007507d709b /fs/splice.c | |
parent | a858d64b7709ca7bd2ee71d66ef3b7190cdcbb7d (diff) | |
download | op-kernel-dev-282f23c6ee343126156dd41218b22ece96d747e3.zip op-kernel-dev-282f23c6ee343126156dd41218b22ece96d747e3.tar.gz |
tcp: implement RFC 5961 3.2
Implement the RFC 5691 mitigation against Blind
Reset attack using RST bit.
Idea is to validate incoming RST sequence,
to match RCV.NXT value, instead of previouly accepted
window : (RCV.NXT <= SEG.SEQ < RCV.NXT+RCV.WND)
If sequence is in window but not an exact match, send
a "challenge ACK", so that the other part can resend an
RST with the appropriate sequence.
Add a new sysctl, tcp_challenge_ack_limit, to limit
number of challenge ACK sent per second.
Add a new SNMP counter to count number of challenge acks sent.
(netstat -s | grep TCPChallengeACK)
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Kiran Kumar Kella <kkiran@broadcom.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'fs/splice.c')
0 files changed, 0 insertions, 0 deletions