Date: Wed, 25 Sep 1996 16:46:23 +0930 (CST) From: Michael Smith <msmith@atrad.adelaide.edu.au> To: michael@memra.com (Michael Dillon) Cc: freebsd-hackers@freebsd.org, server-linux@netspace.org Subject: Re: Random drop solves SYN flooding problems Message-ID: <199609250716.QAA08059@genesis.atrad.adelaide.edu.au> In-Reply-To: <Pine.BSI.3.93.960924232344.10845L-100000@sidhe.memra.com> from "Michael Dillon" at Sep 24, 96 11:24:36 pm
next in thread | previous in thread | raw e-mail | index | archive | help
Michael Dillon stands accused of saying: > first attempt. For example, at 1200 bogus SYNs/sec and the IRIX 6.3 > telnet listen queue of 383, there should be no trouble with peers > with RTT up to about 300 milliseconds. I've tested with a telnet > client 250 milliseconds away while simultaneously bombing the machine > from nearby with ~1200 SYNs/sec, and see no telnet TCP retransmissions. Yeah, great if you and all your clients are in the continental USA and have unloaded high-speed links to you. 250ms is about the rtt of a 14k link using 'average' modems. Stuff the rest of the world of course. 8( -- ]] Mike Smith, Software Engineer msmith@atrad.adelaide.edu.au [[ ]] Genesis Software genesis@atrad.adelaide.edu.au [[ ]] High-speed data acquisition and (GSM mobile) 0411-222-496 [[ ]] realtime instrument control (ph/fax) +61-8-267-3039 [[ ]] Collector of old Unix hardware. "Where are your PEZ?" The Tick [[
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199609250716.QAA08059>