Logging UDP and TCP connection attempts should not be enabled by default.

It's trivial to create a denial of service attack on a box so enabled.

These messages, if enabled at all, must be rate-limited. (!)
This commit is contained in:
Paul Traina 1996-04-09 07:01:53 +00:00
parent d3a3498598
commit d78a37ad5a
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=15154
3 changed files with 6 additions and 6 deletions

View File

@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)tcp_input.c 8.12 (Berkeley) 5/24/95
* $Id: tcp_input.c,v 1.40 1996/03/25 20:13:21 wollman Exp $
* $Id: tcp_input.c,v 1.41 1996/04/04 10:46:39 phk Exp $
*/
#ifndef TUBA_INCLUDE
@ -77,7 +77,7 @@ struct tcpstat tcpstat;
SYSCTL_STRUCT(_net_inet_tcp, TCPCTL_STATS, stats,
CTLFLAG_RD, &tcpstat , tcpstat, "");
static int log_in_vain = 1;
static int log_in_vain = 0;
SYSCTL_INT(_net_inet_tcp, OID_AUTO, log_in_vain, CTLFLAG_RW,
&log_in_vain, 0, "");

View File

@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)tcp_input.c 8.12 (Berkeley) 5/24/95
* $Id: tcp_input.c,v 1.40 1996/03/25 20:13:21 wollman Exp $
* $Id: tcp_input.c,v 1.41 1996/04/04 10:46:39 phk Exp $
*/
#ifndef TUBA_INCLUDE
@ -77,7 +77,7 @@ struct tcpstat tcpstat;
SYSCTL_STRUCT(_net_inet_tcp, TCPCTL_STATS, stats,
CTLFLAG_RD, &tcpstat , tcpstat, "");
static int log_in_vain = 1;
static int log_in_vain = 0;
SYSCTL_INT(_net_inet_tcp, OID_AUTO, log_in_vain, CTLFLAG_RW,
&log_in_vain, 0, "");

View File

@ -31,7 +31,7 @@
* SUCH DAMAGE.
*
* @(#)udp_usrreq.c 8.6 (Berkeley) 5/23/95
* $Id: udp_usrreq.c,v 1.20 1996/03/11 15:13:38 davidg Exp $
* $Id: udp_usrreq.c,v 1.21 1996/04/04 10:46:44 phk Exp $
*/
#include <sys/param.h>
@ -73,7 +73,7 @@ static int udpcksum = 0; /* XXX */
SYSCTL_INT(_net_inet_udp, UDPCTL_CHECKSUM, checksum, CTLFLAG_RW,
&udpcksum, 0, "");
static int log_in_vain = 1;
static int log_in_vain = 0;
SYSCTL_INT(_net_inet_udp, OID_AUTO, log_in_vain, CTLFLAG_RW,
&log_in_vain, 0, "");