"Mixed in with the usual Linux development chatter on the
Internet over the last few months has been a significant discussion
of Linux's TCP SACK (Selective Acknowledgment) implementation.
These comments have generally focused on the performance of the TCP
stack when processing certain SACK events, and some people have
hinted at the presence of a security exposure.
"I was intrigued by the discussion, but it seemed to lack hard
data. What specific conditions were they talking about? Is this a
minor performance nit, or is it an outright server
denial-of-service (DoS) opportunity...?"
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.