aboutsummaryrefslogtreecommitdiffstats
path: root/src/net/tcp.c
diff options
context:
space:
mode:
authorMichael Brown <mcb30@ipxe.org>2013-07-12 03:10:03 +0200
committerMichael Brown <mcb30@ipxe.org>2013-07-12 03:20:05 +0200
commit18d0818f94c6750c680cba582932ae16659c0c38 (patch)
treed2083540b2755e44a2d0a06534e4c9f557386ea1 /src/net/tcp.c
parent936134ed460618e18cc05d677a442d43d5e739a1 (diff)
downloadipxe-18d0818f94c6750c680cba582932ae16659c0c38.tar.gz
[tcp] Do not send RST for unrecognised connections
On large networks with substantial numbers of monitoring agents, unwanted TCP connection attempts may end up flooding iPXE's ARP cache. Fix by silently dropping packets received for unrecognised TCP connections. This should not cause problems, since many firewalls will also silently drop any such packets. Reported-by: Jarrod Johnson <jarrod.b.johnson@gmail.com> Signed-off-by: Michael Brown <mcb30@ipxe.org>
Diffstat (limited to 'src/net/tcp.c')
-rw-r--r--src/net/tcp.c1
1 files changed, 0 insertions, 1 deletions
diff --git a/src/net/tcp.c b/src/net/tcp.c
index 938edd577..8432d559d 100644
--- a/src/net/tcp.c
+++ b/src/net/tcp.c
@@ -1218,7 +1218,6 @@ static int tcp_rx ( struct io_buffer *iobuf,
/* If no connection was found, send RST */
if ( ! tcp ) {
- tcp_xmit_reset ( tcp, st_src, tcphdr );
rc = -ENOTCONN;
goto discard;
}