Jesper Skriver 2b1a209a17 Prevent denial of service using bogus fragmented IPv4 packets.
A attacker sending a lot of bogus fragmented packets to the target
(with different IPv4 identification field - ip_id), may be able
to put the target machine into mbuf starvation state.

By setting a upper limit on the number of reassembly queues we
prevent this situation.

This upper limit is controlled by the new sysctl
net.inet.ip.maxfragpackets which defaults to NMBCLUSTERS/4

If you want old behaviour (no upper limit) set this sysctl
to a negative value.

If you don't want to accept any fragments (not recommended)
set the sysctl to 0 (zero)

Obtained from:	NetBSD (partially)
MFC after:	1 week
2001-05-31 21:57:29 +00:00
..
2000-10-07 23:15:17 +00:00
2001-02-04 14:26:56 +00:00
2000-05-01 20:32:07 +00:00
2001-03-16 19:36:23 +00:00
2001-02-04 14:26:56 +00:00
2000-10-26 12:33:42 +00:00
2001-02-04 14:26:56 +00:00
2001-02-04 14:26:56 +00:00
2001-02-04 14:26:56 +00:00
2001-03-28 14:13:19 +00:00
2000-08-13 04:31:06 +00:00
2001-02-06 11:21:58 +00:00
2000-05-24 04:21:35 +00:00
2001-02-04 14:26:56 +00:00
2001-02-04 14:26:56 +00:00
2000-10-26 12:33:42 +00:00
1999-12-22 19:13:38 +00:00
2001-02-04 14:26:56 +00:00
2001-04-20 11:58:56 +00:00
2001-04-20 11:58:56 +00:00
2001-04-20 11:58:56 +00:00
2001-04-20 11:58:56 +00:00
2001-02-26 20:10:16 +00:00