Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 25 Sep 1996 16:46:23 +0930 (CST)
From:      Michael Smith <msmith@atrad.adelaide.edu.au>
To:        michael@memra.com (Michael Dillon)
Cc:        freebsd-hackers@freebsd.org, server-linux@netspace.org
Subject:   Re: Random drop solves SYN flooding problems
Message-ID:  <199609250716.QAA08059@genesis.atrad.adelaide.edu.au>
In-Reply-To: <Pine.BSI.3.93.960924232344.10845L-100000@sidhe.memra.com> from "Michael Dillon" at Sep 24, 96 11:24:36 pm

next in thread | previous in thread | raw e-mail | index | archive | help
Michael Dillon stands accused of saying:
> first attempt.  For example, at 1200 bogus SYNs/sec and the IRIX 6.3
> telnet listen queue of 383, there should be no trouble with peers
> with RTT up to about 300 milliseconds.  I've tested with a telnet
> client 250 milliseconds away while simultaneously bombing the machine
> from nearby with ~1200 SYNs/sec, and see no telnet TCP retransmissions.

Yeah, great if you and all your clients are in the continental USA and have 
unloaded high-speed links to you.  250ms is about the rtt of a 14k link
using 'average' modems.  Stuff the rest of the world of course.  8(

-- 
]] Mike Smith, Software Engineer        msmith@atrad.adelaide.edu.au    [[
]] Genesis Software                     genesis@atrad.adelaide.edu.au   [[
]] High-speed data acquisition and      (GSM mobile) 0411-222-496       [[
]] realtime instrument control          (ph/fax)  +61-8-267-3039        [[
]] Collector of old Unix hardware.      "Where are your PEZ?" The Tick  [[



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199609250716.QAA08059>