TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Bringing insights into TCP resets and timeouts to Cloudflare Radar

68 pointsby dbelson9 months ago

2 comments

o11c8 months ago
(If the author is reading this: bad formatting for fin: and acknumdiff: )<p>Once again a discussion that covers RST injection attacks fails to consider the one case I actually saw in the wild ...<p>My observation involved long-lived (much longer than typical for HTTP) TCP connections with low-but-nonzero traffic (there was an application-layer heartbeat). For at least some US residential IPs (some with effectively static allocation) connected to a datacenter, they would <i>reliably</i> get RST injected (to the client only, not the server) after being connected long enough (usually a couple hours, but not any obvious pattern).
评论 #41485494 未加载
评论 #41485293 未加载
评论 #41485658 未加载
pornel8 months ago
They&#x27;ve given out a bot identification signal. Now botters are going to deliberately cancel 6% of their TCP connections ;)