Date: Fri, 21 Jan 2000 15:37:10 -0700 From: Wes Peters <wes@softweyr.com> To: Brett Glass <brett@lariat.org> Cc: Gene Harris <zeus@tetronsoftware.com>, freebsd-security@freebsd.org Subject: Re: Some observations on stream.c and streamnt.c Message-ID: <3888DF96.33157880@softweyr.com> References: <4.2.2.20000120194543.019a8d50@localhost> <4.2.2.20000121141918.01a54ef0@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
Brett Glass wrote:
>
> At 02:18 PM 1/21/2000 , Gene Harris wrote:
>
> >After eight hours of testing, in which I have been
> >bombarding the NT 4.0 SP6a Server, the CPU usage on an
> >unloaded machine jumped to 27%. However, when I started up
> >Oracle 8.05 and ran a rather lengthy query against a 400MB
> >database, no distinguishable differences exist in the query
> >time between a machine under attack and one not under
> >attack.
>
> A poor test, IMHO. It's disk-intensive and CPU-intensive,
> but not network-intensive. Also, other conditions can
> affect the results. Were the machines on a network with
> a live gateway router? Remember, traffic to, from, and
> through the router is significant, since one of the
> effects of the exploit is to cause a storm of packets
> on the local LAN.
>
> I've made an NT/IIS server virtually inaccessible using
> the same exploit.
We have NT 4.0 Server (SP4) running on a P5/200 here, 128 MB RAM, EEPro
10/100. On a 100Base-TX HDX isolated LAN, hitting it with the packets/
second set to 1000 resulted in poor system performance; changing that to
10.000 resulted in the machine almost immediately crashing all the way
to the BIOS boot.
--
"Where am I, and what am I doing in this handbasket?"
Wes Peters Softweyr LLC
wes@softweyr.com http://softweyr.com/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3888DF96.33157880>
