lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.63.0703090027310.30949@qynat.qvtvafvgr.pbz>
Date:	Fri, 9 Mar 2007 00:31:45 -0800 (PST)
From:	David Lang <david.lang@...italinsight.com>
To:	Florian Weimer <fweimer@....de>
cc:	Niklaus <niklaus@...il.com>, linux-kernel@...r.kernel.org
Subject: Re: more than 65535 outbound connections

On Fri, 9 Mar 2007, Florian Weimer wrote:

>> i read on the web that terry lambert has got 1.6 million simultaneous
>> connection ? how is the way it is done.
>
> Multiple IP addresses, I guess.

what must be unique is the four-parts of a connection
source IP, source port, destination IP, destination port

as long as the set is unique any element can be re-used (a big webserver has one 
IP and port on the server side, but many IPs and ports on the client side)

when you make a connection you have the option of not specifying the source IP 
and port (letting the OS/library pick ones for you). some libraries will not 
re-use the same source port for multiple connections, others will (with the 
appropriate options)

if you want to have your program assign the source IPs and port itself you can 
do so (you may have to also give the library/os a flag that tells it you know 
what you're doing, and it's ok to let you re-use ports)

David Lang
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ