On Dec 5, 2012, at 2:06 PM, Fred Baker (fred) <[email protected]> wrote:
> If you want to get into software rewriting, the simplest thing I might come
> up with would be to put TCBs in some form of LRU list and, at a point where
> you need a port back, close the TCB that least recently did anything. My
> understanding is that this was implemented 15 years ago to manage SYN
> attacks, and could be built on to manage this form of "attack".
I can say for certain that it was implemented (at least) twice that long ago
(circa 1983) in a TCP implementation for a particular memory constrained
environment ("640K should be good enough for anybody") :).
Regards,
-drc