- From: Poul-Henning Kamp <phk@phk.freebsd.dk>
- Date: Fri, 02 Aug 2013 20:56:01 +0000
- To: "Scharf, Michael (Michael)" <michael.scharf@alcatel-lucent.com>
- cc: "ietf-http-wg@w3.org" <ietf-http-wg@w3.org>, "tcpm@ietf.org" <tcpm@ietf.org>
In message <655C07320163294895BBADA28372AF5D07CBF8@FR712WXCHMBA15.zeu.alcatel-l ucent.com>, "Scharf, Michael (Michael)" writes: >As mentioned today on the mic, the TCPM working group has a working group >item that allows data to be carried in the SYN and SYN-ACK packets and that >is consumed by the receiving end during the initial connection handshake, Uhm, didn't we try that once with TTCP only to find out that it opened a major DoS hole ? -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.
Received on Friday, 2 August 2013 20:56:25 UTC