tcp - Dave's Blog

My timeline on Mastodon

Retweet of newsycombinator

2015 Mar 3, 11:31
No Wireshark? No TCPDump? No Problem …

freebsdgirl: If there is one thing movies have taught me, it's that hacking the Gibson requires accessorizing.

2015 Jan 22, 11:54
[NPC] Randi Harper @freebsdgirl :
If there is one thing movies have taught me, it's that hacking the Gibson requires accessorizing.


2011 Jun 10, 8:14Protolol aggregates protocol related tweet jokes: "The problem with TCP jokes is that people keep retelling them slower until you get them." - eigenrickPermalinkCommentshumor technical protocol tcp tcp-ip

[tcpm] Tuning TCP parameters for the 21st century

2010 Feb 19, 2:43A Googler's thoughts on tuning TCP params for better perf.PermalinkCommentsgoogle performance network tcp technical

RFC 2132 - DHCP Options and BOOTP Vendor Extensions

2009 Dec 12, 2:42"The Dynamic Host Configuration Protocol (DHCP) [1] provides a framework for passing configuration information to hosts on a TCP/IP network. Configuration parameters and other control information are carried in tagged data items that are stored in the 'options' field of the DHCP message. The data items themselves are also called "options.""PermalinkCommentstechnical reference rfc dhcp ietf ipv4 ip

InfoQ: HTTP Status Report

2009 Apr 29, 12:34"In this presentation, recorded at QCon San Francisco 2008, HTTPbis WG chair Mark Nottingham gives an update on the current status of the HTTP protocol in the wild, and the ongoing work to clarify the HTTP specification."PermalinkCommentshttp httpbis protocol ietf reference video authentication cookie uri url tcp sctp mark-nottingham via:ericlaw

obstcp - Google Code

2008 Oct 14, 11:14Similar in concept to the Pirate Bay suggestion of encrypting all TCP/IP connections if both server and client support it: "Obfuscated TCP is a transport layer protocol that adds opportunistic encryption. It's designed to hamper and detect large-scale wiretapping and corruption of TCP traffic on the Internet."PermalinkCommentsinternet tcp encryption security google privacy opensource cryptography network ssl

Security Assessment of the Internet Protocol

2008 Aug 20, 4:29A description of IP with implementation guidance to avoid historical security issues.PermalinkCommentsreference ietf ip tcp network protocol security internet

d2r: postel's law is for implementors, not designers

2007 Oct 17, 5:55Diego Doval expresses my thoughts on this topic very well and also likely well before I even had thoughts on this topic.PermalinkCommentsblog article history robustness-principle jon-postel internet tcp

Ironick: My history of the (Internet) Robustness Principle.

2007 Oct 17, 5:17History of the various versions of Postel's Law or the Robustness Principle which paraphrased says: "In general, an implementation should be conservative in its sending behavior, and liberal in its receiving behavior. That is, it should be careful to sendPermalinkCommentsblog article history robustness-principle jon-postel internet tcp

Fragmentation Considered Very Harmful

2006 Apr 4, 5:23IPv4 fragmentation is not sufficiently robust for general use in today's Internet. The 16-bit IP identification field is not large enough to prevent frequent incorrectly assembled IP fragments, and the TCP and UDP checksums are insufficient tPermalinkCommentsip fragmentation security internet rfc ietf

Hyper Text Coffee Pot Control Protocol (HTCPCP/1.0) - RFC 2324

2006 Feb 3, 12:37PermalinkCommentshumor rfc reference http internet
Older Entries Creative Commons License Some rights reserved.