Skip to content

Commit

Permalink
ipvs: secure_tcp does provide alternate state timeouts
Browse files Browse the repository at this point in the history
Also reword the test to make it read more easily (to me)

Signed-off-by: Simon Horman <[email protected]>
Signed-off-by: Pablo Neira Ayuso <[email protected]>
  • Loading branch information
horms authored and ummakynes committed Nov 1, 2011
1 parent b6338b5 commit 325aadc
Showing 1 changed file with 4 additions and 6 deletions.
10 changes: 4 additions & 6 deletions Documentation/networking/ipvs-sysctl.txt
Original file line number Diff line number Diff line change
Expand Up @@ -140,13 +140,11 @@ nat_icmp_send - BOOLEAN
secure_tcp - INTEGER
0 - disabled (default)

The secure_tcp defense is to use a more complicated state
transition table and some possible short timeouts of each
state. In the VS/NAT, it delays the entering the ESTABLISHED
until the real server starts to send data and ACK packet
(after 3-way handshake).
The secure_tcp defense is to use a more complicated TCP state
transition table. For VS/NAT, it also delays entering the
TCP ESTABLISHED state until the three way handshake is completed.

The value definition is the same as that of drop_entry or
The value definition is the same as that of drop_entry and
drop_packet.

sync_threshold - INTEGER
Expand Down

0 comments on commit 325aadc

Please sign in to comment.