>
> Usually it requires someone motivated to step up and do the work. You
> sound motivated. The easiest thing would be for you to step up and
> write the implementation.
>
> Having looked at this once long ago my memory is that SeND only protects
> against an attacker on a local lan. That is not a
IPv6 is rapidly deploying globally. NDP replaces the role of ARP in IPv6 and
provides mapping from IP address to MAC address.
However, the NDP protocol is as insecure as the ARP protocol, and can be easily
spoofed, and then the attacker can conduct man-in-the-middle attacks.
The solution to the
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On Sunday, 9 September 2018 02:24, Neal Cardwell wrote:
> By default, and essentially always in practice (AFAIK), Linux
> installations enable syncookies. With syncookies, there is essentially
> no limit on the syn queue, o
Thank you very much for your previous answer, sorry for the inconvenience.
But now I want to ask you one more question.
The question is why we need two variables to control the syn queue?
The first is the "backlog" parameter of the "listen" system call that controls
the maximum length limit of
Sent with ProtonMail Secure Email.
‐‐‐ Original Message ‐‐‐
On 4 September 2018 9:06 PM, Neal Cardwell wrote:
> On Tue, Sep 4, 2018 at 1:48 AM Ttttabcd a...@protonmail.com wrote:
>
> > Hello everyone,recently I am looking at the source code for handling TCP
&
Hello everyone,recently I am looking at the source code for handling TCP
three-way handshake(Linux Kernel version 4.18.5).
I found some strange places in the source code for handling syn messages.
in the function "tcp_conn_request"
This code will be executed when we don't enable the syn cookies
Hello everyone who develops the kernel.
At the beginning I was looking for the source author, but his email address has
expired, so I can only come here to ask questions.
The problem is in the /net/ipv6/reassembly.c file, the author is Pedro Roque.
I found some strange places when I read the co