<div dir="ltr"><div class="gmail_default" style="font-family:verdana,sans-serif">Hello.<br><br></div><div class="gmail_default" style="font-family:verdana,sans-serif">There is a vulnerability in the Linux kernel's tcp stack implementation (kernel versions 3.6 to 4.6) [1]. Since, no patch is available yet, users can use sysctl to set the challenge ACK limit. <br><span style="line-height:1.62"><br>It seems that Linux kernel (ver. 4.7) resolve this vulnerability </span>by randomizing the maximum number challenge ACKs sent per second and enforcing the per-socket challenge ACK limits etc. <br><br>So, I would like to ask a question: can I change
'tcp_challenge_ack_limit' from a default value: '100' (available in
12.04 LTS release) to e.g. '1000'? <span style="line-height:1.62"><br></span><br>For more informations see also: [2] and [3].<br><br></div><div class="gmail_default" style="font-family:verdana,sans-serif">Best regards.<br>_____________<br>[1] <a href="https://blogs.akamai.com/2016/08/vulnerability-in-the-linux-kernels-tcp-stack-implementation.html">https://blogs.akamai.com/2016/08/vulnerability-in-the-linux-kernels-tcp-stack-implementation.html</a> <br>[2] <a href="https://lists.debian.org/debian-security/2016/08/msg00035.html">https://lists.debian.org/debian-security/2016/08/msg00035.html</a> <br>[3] <a href="https://security-tracker.debian.org/tracker/CVE-2016-5696">https://security-tracker.debian.org/tracker/CVE-2016-5696</a><br></div></div>