
{"id":5579,"date":"2011-08-20T12:44:15","date_gmt":"2011-08-20T12:44:15","guid":{"rendered":"http:\/\/www.beautifulwork.org\/?p=5579"},"modified":"2011-08-20T12:44:15","modified_gmt":"2011-08-20T12:44:15","slug":"parameters-tcp_retries2","status":"publish","type":"post","link":"https:\/\/www.trueangle.org\/index.php\/2011\/08\/20\/parameters-tcp_retries2\/","title":{"rendered":"parameters tcp_retries2"},"content":{"rendered":"<h5><u> A UNIX Parameter <\/u><\/h5>\n<pre>\n$cat \/proc\/sys\/net\/ipv4\/tcp_retries2\n15\n$\n\n<\/pre>\n<p><\/p>\n<h5><u> Parameter Definition <\/u><\/h5>\n<pre>\nHow  many  times  to   retry  before  killing  alive  TCP\nconnection. RFC1122 says that  the limit should be longer\nthan 100 sec.  It is too small number.  The default value\nof 15 corresponds to ~ 13 - 30 minutes, depending on RTO.\n\n<\/pre>\n<p><\/p>\n<h5><u> Parameter Code Internals <\/u><\/h5>\n<p><code><br \/>\n<b> snippet 1 <\/b><br \/>\n{<br \/>\n                .procname       = \"tcp_retries2\",<br \/>\n                .data           = &amp;sysctl_tcp_retries2,<br \/>\n                .maxlen         = sizeof(int),<br \/>\n                .mode           = 0644,<br \/>\n                .proc_handler   = proc_dointvec<br \/>\n        },<\/p>\n<p><b> snippet 2 <\/b><br \/>\n  if (retransmits_timed_out(sk, sysctl_tcp_retries1, 0, 0)) {<br \/>\n                        \/* Black hole detection *\/<br \/>\n                        tcp_mtu_probing(icsk, sk);<\/p>\n<p>                        dst_negative_advice(sk);<br \/>\n                }<\/p>\n<p>                retry_until = sysctl_tcp_retries2;<br \/>\n                if (sock_flag(sk, SOCK_DEAD)) {<br \/>\n                        const int alive = (icsk-&gt;icsk_rto &lt; TCP_RTO_MAX);<\/p>\n<p>                        retry_until = tcp_orphan_retries(sk, alive);<br \/>\n                        do_reset = alive ||<br \/>\n                                !retransmits_timed_out(sk, retry_until, 0, 0);<\/p>\n<p>                        if (tcp_out_of_resources(sk, do_reset))<br \/>\n                                return 1;<br \/>\n                }<\/p>\n<p><\/code><br \/>\n<\/p>\n<h5><u> Related From Research Paper <\/u><\/h5>\n<pre>\nA tool  for TCP  stack testing and  TCP\/IP fingerprinting\n(a.k.a.   OS  detection)   is  introduced.   While  tools\npresently exist  to do either  OS detection[1, 2]  or TCP\nstack testing[3, 4], the  methods they employ are limited\nby  the  techniques  and  analysis  performed,  sometimes\nresulting in incorrect re- sults or no results at all. We\nintroduce   synscan,  a  tool   whose  objective   is  to\nfingerprint     every      aspect     of     a     TCP\/IP\nimplementation.    synscan   is    not    meant   as    a\nproof-of-concept tool; rather, it  is a robust and useful\ntool which can  be used in addition to  others for TCP\/IP\nstack  testing and OS  de- tection.  synscan incorporates\nmost  of the  techiques used  by the  existing  tools and\nintroduces  a number  of new  ones.  synscan's  s primary\nadvantage is that each test begins with a TCP SYN segment\n(hence the name)  to an open port, giving  it the ability\nto   test  and  fingerprint   even  the   most  fortified\nhosts. Conclusive data from  large network scans and com-\nparisons  to   results  from  existing   tools  are  also\nreported.\n\nsource:\nSYNSCAN: Towards Complete TCP\/IP Fingerprinting\n                       Greg Taleck\n                    \n                    NFR Security, Inc.\n               5 Choke Cherry Rd, Suite 200\n                   Rockville, MD 20850\n\n\n\n\n<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>A UNIX Parameter $cat \/proc\/sys\/net\/ipv4\/tcp_retries2 15 $ Parameter Definition How many times to retry before killing alive TCP connection. RFC1122 says that the limit should be longer than 100 sec. It is too small number. The default value of 15 corresponds to ~ 13 &#8211; 30 minutes, depending on RTO. Parameter Code Internals snippet 1 &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.trueangle.org\/index.php\/2011\/08\/20\/parameters-tcp_retries2\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;parameters tcp_retries2&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[1380,1385,1548],"_links":{"self":[{"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/posts\/5579"}],"collection":[{"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/comments?post=5579"}],"version-history":[{"count":0,"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/posts\/5579\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/media?parent=5579"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/categories?post=5579"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trueangle.org\/index.php\/wp-json\/wp\/v2\/tags?post=5579"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}