<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/netinet/ip_icmp.c, branch release/3.5.0_cvs</title>
<subtitle>FreeBSD source tree</subtitle>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/'/>
<entry>
<title>This commit was manufactured by cvs2svn to create tag</title>
<updated>2000-06-25T00:20:49+00:00</updated>
<author>
<name>cvs2svn</name>
<email>cvs2svn@FreeBSD.org</email>
</author>
<published>2000-06-25T00:20:49+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=8e878a0310eae754021dbd73ca928eaf7cf6a65c'/>
<id>8e878a0310eae754021dbd73ca928eaf7cf6a65c</id>
<content type='text'>
'RELENG_3_5_0_RELEASE'.

This commit was manufactured to restore the state of the 3.5-RELEASE image.
Releases prior to 5.3-RELEASE are omitting the secure/ and crypto/ subdirs.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
'RELENG_3_5_0_RELEASE'.

This commit was manufactured to restore the state of the 3.5-RELEASE image.
Releases prior to 5.3-RELEASE are omitting the secure/ and crypto/ subdirs.
</pre>
</div>
</content>
</entry>
<entry>
<title>MFC: correct boundary checks against IP options</title>
<updated>2000-06-08T15:11:50+00:00</updated>
<author>
<name>Jonathan Lemon</name>
<email>jlemon@FreeBSD.org</email>
</author>
<published>2000-06-08T15:11:50+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=4a2a2458ce06cf19c3f630feff2959045ebc2504'/>
<id>4a2a2458ce06cf19c3f630feff2959045ebc2504</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>MFC: Add the net.inet.icmp.drop_redirect, net.inet.icmp.log_redirect,</title>
<updated>1999-10-14T11:49:38+00:00</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>1999-10-14T11:49:38+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=2cff5ec308c720ff6ce71ca875b2f412c350525f'/>
<id>2cff5ec308c720ff6ce71ca875b2f412c350525f</id>
<content type='text'>
net.inet.tcp.drop_synfin and net.inet.tcp.restrict_rst sysctls.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
net.inet.tcp.drop_synfin and net.inet.tcp.restrict_rst sysctls.
</pre>
</div>
</content>
</entry>
<entry>
<title>$Id$ -&gt; $FreeBSD$</title>
<updated>1999-08-29T16:33:42+00:00</updated>
<author>
<name>Peter Wemm</name>
<email>peter@FreeBSD.org</email>
</author>
<published>1999-08-29T16:33:42+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=c4f617ca01b475bdf034553dfe123deeb1589899'/>
<id>c4f617ca01b475bdf034553dfe123deeb1589899</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>MFC: When an incoming packet is reflected back as an ICMP reply, make sure we</title>
<updated>1999-03-06T23:12:32+00:00</updated>
<author>
<name>Archie Cobbs</name>
<email>archie@FreeBSD.org</email>
</author>
<published>1999-03-06T23:12:32+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=787a3af8ea279e6de4188e2b6b1eb47cc8b0732b'/>
<id>787a3af8ea279e6de4188e2b6b1eb47cc8b0732b</id>
<content type='text'>
zero "m-&gt;m_pkthdr.rcvif", otherwise ipfw may wrongly match the outgoing packet.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
zero "m-&gt;m_pkthdr.rcvif", otherwise ipfw may wrongly match the outgoing packet.
</pre>
</div>
</content>
</entry>
<entry>
<title>    Cleanup icmp_var.h, make icmp bandlim sysctl permanent but if ICMP_BANDLIM</title>
<updated>1998-12-04T04:21:25+00:00</updated>
<author>
<name>Matthew Dillon</name>
<email>dillon@FreeBSD.org</email>
</author>
<published>1998-12-04T04:21:25+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=5fce7fc47f06028dd000712d8df55ff54de36c09'/>
<id>5fce7fc47f06028dd000712d8df55ff54de36c09</id>
<content type='text'>
    option not defined the sysctl int value is set to -1 and read-only.

    #ifdef KERNEL's added appropriately to wall off visibility of kernel
    routines from user code.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
    option not defined the sysctl int value is set to -1 and read-only.

    #ifdef KERNEL's added appropriately to wall off visibility of kernel
    routines from user code.
</pre>
</div>
</content>
</entry>
<entry>
<title>Reviewed by:	freebsd-current</title>
<updated>1998-12-03T20:23:21+00:00</updated>
<author>
<name>Matthew Dillon</name>
<email>dillon@FreeBSD.org</email>
</author>
<published>1998-12-03T20:23:21+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=51508de112f6fd562148cad74dde057d9e9e7305'/>
<id>51508de112f6fd562148cad74dde057d9e9e7305</id>
<content type='text'>
    Add ICMP_BANDLIM option and 'net.inet.icmp.icmplim' sysctl.  If option
    is specified in kernel config, icmplim defaults to 100 pps.  Setting it
    to 0 will disable the feature.  This feature limits ICMP error responses
    for packets sent to bad tcp or udp ports, which does a lot to help the
    machine handle network D.O.S. attacks.

    The kernel will report packet rates that exceed the limit at a rate of
    one kernel printf per second.  There is one issue in regards to the
    'tail end' of an attack... the kernel will not output the last report
    until some unrelated and valid icmp error packet is return at some
    point after the attack is over.  This is a minor reporting issue only.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
    Add ICMP_BANDLIM option and 'net.inet.icmp.icmplim' sysctl.  If option
    is specified in kernel config, icmplim defaults to 100 pps.  Setting it
    to 0 will disable the feature.  This feature limits ICMP error responses
    for packets sent to bad tcp or udp ports, which does a lot to help the
    machine handle network D.O.S. attacks.

    The kernel will report packet rates that exceed the limit at a rate of
    one kernel printf per second.  There is one issue in regards to the
    'tail end' of an attack... the kernel will not output the last report
    until some unrelated and valid icmp error packet is return at some
    point after the attack is over.  This is a minor reporting issue only.
</pre>
</div>
</content>
</entry>
<entry>
<title>Turn off replies to ICMP echo requests for broadcast and multicast</title>
<updated>1998-09-15T10:49:03+00:00</updated>
<author>
<name>Joseph Koshy</name>
<email>jkoshy@FreeBSD.org</email>
</author>
<published>1998-09-15T10:49:03+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=61a4defd549e94b2bc43b5e964ceca6a12241540'/>
<id>61a4defd549e94b2bc43b5e964ceca6a12241540</id>
<content type='text'>
addresses by default.

Add a knob "icmp_bmcastecho" to "rc.network" to allow this
behaviour to be controlled from "rc.conf".

Document the controlling sysctl variable "net.inet.icmp.bmcastecho"
in sysctl(3).

Reviewed by: dg, jkh
Reminded on -hackers by: Steinar Haug &lt;sthaug@nethelp.no&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
addresses by default.

Add a knob "icmp_bmcastecho" to "rc.network" to allow this
behaviour to be controlled from "rc.conf".

Document the controlling sysctl variable "net.inet.icmp.bmcastecho"
in sysctl(3).

Reviewed by: dg, jkh
Reminded on -hackers by: Steinar Haug &lt;sthaug@nethelp.no&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed logic in the test to drop ICMP echo and timestamp packets when</title>
<updated>1998-05-26T11:34:30+00:00</updated>
<author>
<name>David Greenman</name>
<email>dg@FreeBSD.org</email>
</author>
<published>1998-05-26T11:34:30+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=d311884fb6ec6734054955dce59fb7247c032969'/>
<id>d311884fb6ec6734054955dce59fb7247c032969</id>
<content type='text'>
net.inet.ip.icmp.bmcastecho = 0 by removing the extra check for the
address being a multicast address. The test now relies on the link
layer flags that indicate it was received via multicast. The previous
logic was broken and replied to ICMP echo/timestamp broadcasts even
when the sysctl option disallowed them.
Reviewed by:	wollman
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
net.inet.ip.icmp.bmcastecho = 0 by removing the extra check for the
address being a multicast address. The test now relies on the link
layer flags that indicate it was received via multicast. The previous
logic was broken and replied to ICMP echo/timestamp broadcasts even
when the sysctl option disallowed them.
Reviewed by:	wollman
</pre>
</div>
</content>
</entry>
<entry>
<title>ICMP Timestamp Request messages could have harbored the same sort of</title>
<updated>1997-08-25T16:29:27+00:00</updated>
<author>
<name>Garrett Wollman</name>
<email>wollman@FreeBSD.org</email>
</author>
<published>1997-08-25T16:29:27+00:00</published>
<link rel='alternate' type='text/html' href='http://cgit.freebsd.org/src/commit/?id=fe0fb8abd09d4adf59261226e67e8dd58ecfd281'/>
<id>fe0fb8abd09d4adf59261226e67e8dd58ecfd281</id>
<content type='text'>
problem as Echo Requests when broad/multicast.  When multicast echo responses
are disabled, also do the same for timestamp responses.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
problem as Echo Requests when broad/multicast.  When multicast echo responses
are disabled, also do the same for timestamp responses.
</pre>
</div>
</content>
</entry>
</feed>
