summaryrefslogtreecommitdiff
path: root/accel-pppd/ctrl/l2tp
diff options
context:
space:
mode:
authorDmitry Kozlov <xeb@mail.ru>2017-04-18 16:07:35 +0300
committerDmitry Kozlov <xeb@mail.ru>2017-04-18 16:13:27 +0300
commite3fc927ee321ed6663d46357de0165340b792860 (patch)
treef346c9b3c6d178b6850cf253ac60fd5917c08a69 /accel-pppd/ctrl/l2tp
parent8e91194cfd617af017f72e3e785cc71490482d38 (diff)
downloadaccel-ppp-e3fc927ee321ed6663d46357de0165340b792860.tar.gz
accel-ppp-e3fc927ee321ed6663d46357de0165340b792860.zip
implemented session count limiting
new config option: [common] max-sessions=N If set then accel-pppd stops reply to new connection requests if total number of sessions (active and starting) is reached specified limit.
Diffstat (limited to 'accel-pppd/ctrl/l2tp')
-rw-r--r--accel-pppd/ctrl/l2tp/l2tp.c9
1 files changed, 9 insertions, 0 deletions
diff --git a/accel-pppd/ctrl/l2tp/l2tp.c b/accel-pppd/ctrl/l2tp/l2tp.c
index 76c679c7..dcf413d8 100644
--- a/accel-pppd/ctrl/l2tp/l2tp.c
+++ b/accel-pppd/ctrl/l2tp/l2tp.c
@@ -2731,6 +2731,9 @@ static int l2tp_recv_SCCRQ(const struct l2tp_serv_t *serv,
return 0;
}
+ if (conf_max_sessions && ap_session_stat.active + ap_session_stat.starting > conf_max_sessions)
+ return 0;
+
if (triton_module_loaded("connlimit")
&& connlimit_check(cl_key_from_ipv4(pack->addr.sin_addr.s_addr))) {
log_warn("l2tp: connection limits reached,"
@@ -3257,6 +3260,9 @@ static int l2tp_recv_ICRQ(struct l2tp_conn_t *conn,
return 0;
}
+ if (conf_max_sessions && ap_session_stat.active + ap_session_stat.starting > conf_max_sessions)
+ return 0;
+
if (triton_module_loaded("connlimit")
&& connlimit_check(cl_key_from_ipv4(conn->peer_addr.sin_addr.s_addr))) {
log_tunnel(log_warn, conn, "connection limits reached,"
@@ -3557,6 +3563,9 @@ static int l2tp_recv_OCRQ(struct l2tp_conn_t *conn,
return 0;
}
+ if (conf_max_sessions && ap_session_stat.active + ap_session_stat.starting > conf_max_sessions)
+ return 0;
+
if (triton_module_loaded("connlimit")
&& connlimit_check(cl_key_from_ipv4(conn->peer_addr.sin_addr.s_addr))) {
log_tunnel(log_warn, conn, "connection limits reached,"