netdev
[Top] [All Lists]

Re: question about linux tcp request queue handling

To: "Paul Albrecht" <palbrecht@xxxxxxxxx>
Subject: Re: question about linux tcp request queue handling
From: Andi Kleen <ak@xxxxxxx>
Date: 07 Jul 2003 23:48:10 +0200
Cc: niv@xxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, "netdev" <netdev@xxxxxxxxxxx>
In-reply-to: <001401c344df$ccbc63c0$6801a8c0@oemcomputer.suse.lists.linux.kernel>
References: <3F08858E.8000907@us.ibm.com.suse.lists.linux.kernel> <001a01c3441c$6fe111a0$6801a8c0@oemcomputer.suse.lists.linux.kernel> <3F08B7E2.7040208@us.ibm.com.suse.lists.linux.kernel> <000d01c3444f$e6439600$6801a8c0@oemcomputer.suse.lists.linux.kernel> <3F090A4F.10004@us.ibm.com.suse.lists.linux.kernel> <001401c344df$ccbc63c0$6801a8c0@oemcomputer.suse.lists.linux.kernel>
Sender: netdev-bounce@xxxxxxxxxxx
User-agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2
"Paul Albrecht" <palbrecht@xxxxxxxxx> writes:

> This statement is inconsistent with the description of this scenario in
> Steven's TCP/IP Illustrated.  Specifically, continuing the handshake in the
> TCP layer, i.e., sending a syn/ack and moving to the syn_recd state, is
> incorrect if the limit of the server's socket backlog would be exceeded.
> How do you account for this discrepancy between linux and other
> berkeley-derived implementations?

The 4.4BSD-Lite code described in Stevens is long outdated. All modern
BSDs (and probably most other Unixes too) do it in a similar way to what 
Nivedita described. The keywords are "syn flood attack" and "DoS". 

-Andi

<Prev in Thread] Current Thread [Next in Thread>