From 169a22353fc6e28020006f77bb4b84896d9bba51 Mon Sep 17 00:00:00 2001 From: Florian Westphal Date: Thu, 3 Jun 2010 00:42:30 +0000 Subject: [PATCH] --- yaml --- r: 200167 b: refs/heads/master c: 57f1553ee5d9f093660cc49098f494e17ed11668 h: refs/heads/master i: 200165: 17b611ba7a90e181fe97386cb2237bf27bfe93d6 200163: 230dc5316d3acafdbf097bee7670a82fa1a71bf5 200159: c225ba04e05341cfaab352e18a5a039d3b61a0ca v: v3 --- [refs] | 2 +- trunk/net/ipv4/Kconfig | 10 +++++----- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/[refs] b/[refs] index 9b58652e3d0f..7d7102b1be67 100644 --- a/[refs] +++ b/[refs] @@ -1,2 +1,2 @@ --- -refs/heads/master: ca739481662137b8f717bc21f16719cda3c33d6b +refs/heads/master: 57f1553ee5d9f093660cc49098f494e17ed11668 diff --git a/trunk/net/ipv4/Kconfig b/trunk/net/ipv4/Kconfig index 8e3a1fd938ab..7c3a7d191249 100644 --- a/trunk/net/ipv4/Kconfig +++ b/trunk/net/ipv4/Kconfig @@ -303,7 +303,7 @@ config ARPD If unsure, say N. config SYN_COOKIES - bool "IP: TCP syncookie support (disabled per default)" + bool "IP: TCP syncookie support" ---help--- Normal TCP/IP networking is open to an attack known as "SYN flooding". This denial-of-service attack prevents legitimate remote @@ -328,13 +328,13 @@ config SYN_COOKIES server is really overloaded. If this happens frequently better turn them off. - If you say Y here, note that SYN cookies aren't enabled by default; - you can enable them by saying Y to "/proc file system support" and + If you say Y here, you can disable SYN cookies at run time by + saying Y to "/proc file system support" and "Sysctl support" below and executing the command - echo 1 >/proc/sys/net/ipv4/tcp_syncookies + echo 0 > /proc/sys/net/ipv4/tcp_syncookies - at boot time after the /proc file system has been mounted. + after the /proc file system has been mounted. If unsure, say N.