Upstream kernel have decided to enable syncookies by default (according to that 
debian bug, since Linux 2.6.37!).
This makes sense, as the main downsides have already been resolved (especially 
window scaling even under syncookies-activation), and this feature only 
kicks-in if the SYN-queue is overloaded.

We might now consider taking out this (now superfluous) tcp_syncookies
entry from /etc/sysctl.d/10-network-security.conf ...


I think, a similar situation has now arisen with respect to the
"tcp_ecn" setting, where the (conservative) (enabled by default)
fallback mechanism in the kernel, along with the rarity of ecn-
intolerance, along with the wide ECN-adoption in practice in Apple ios /
MAC OS X now, along with the importance of ECN for smooth responsive
internet in the face of congestion, means that this tcp_ecn setting
should similarly be seriously considered.   This should be the subject
of new bug report right-soon-now =).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/57091

Title:
  proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to
  permit SYN flood defense...

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/procps/+bug/57091/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to