Re: Dynamic IP hack (PR#294)

Erik Corry (erik@arbat.com)
Tue, 20 Oct 1998 15:43:11 +0200


On Tue, Oct 20, 1998 at 03:12:21PM +0100, Alan Cox wrote:
>Erik:
>>Alan:
>>>Erik:
>>>>Alan:
>>>>>Erik:
>>>>>> Note that the RST-provoking hack has the advantage that if
>>>>>> you are lucky and get your old address back (or if you do
>>>>>> so half the time, or 99% of the time) things 'just work'.
>>>>>
>>>>> And if you cycle through the new address back to the old in under 120
>>>>> seconds you violate the time wait requirements of the tcp protocol
>>>>
>>>> There's no solution here that doesn't violate protocol
>>>> requirements. If someone presses the big red button and
>>>> we reboot in under 120s we also violate the time wait
>>>> requirements of the TCP protocol.
>>>
>>> And the only person we might screw up is ourselves in that case.
>>
>> Who else do we screw up in the other case?
>
> Whoever got our old address

How?

-- 
Erik Corry erik@arbat.com           Ceterum censeo, Microsoftem esse delendam!

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/