lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1204076936.15970.33.camel@tng>
Date:	Tue, 26 Feb 2008 20:48:56 -0500
From:	Patrick McManus <mcmanus@...ksong.com>
To:	Netdev@...r.kernel.org
Subject: RFC [PATCH 0/3] TCP_DEFER_ACCEPT updates

Hello,

I have a few patches to try and improve the TCP_DEFER_ACCEPT
implementation. The first two are simple, the third is ante for a
discussion on how this should really be implemented.

Patch 1 : timeout values could not be less than allowed by the max
syn-recv queue size algorithms. This was not simply a matter of rounding
up to the next syn-ack retransmit time, it was enforcing at least 5
retransmits on a non-loaded machine even if the timeout (expressed by
the API in seconds) was set to 1.

Patch 2 : a socket that has completed its handshake but which is waiting
for the first data packet was retransmitting its syn-ack during that
period. This patch suppresses that transmission.

Patch 3 : move the connected (and TCP_DEFER'd) socket to ESTABLISHED
after the handshake, but defer placing it in the accept queue until some
data arrives. 

RFC?

-Patrick


--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ