Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jan 2000 16:39:14 -0700
From:      Brett Glass <brett@lariat.org>
To:        Brad Guillory <round@baileylink.net>, freebsd-security@FreeBSD.ORG
Subject:   Re: Some observations on stream.c and streamnt.c
Message-ID:  <4.2.2.20000121163754.0198a470@localhost>
In-Reply-To: <20000121171759.D56672@baileylink.net>
References:  <200001212258.OAA64329@apollo.backplane.com> <Pine.BSF.4.10.10001211649440.4460-100000@tetron02.tetronsoftware.com> <200001212258.OAA64329@apollo.backplane.com>

next in thread | previous in thread | raw e-mail | index | archive | help
At 04:17 PM 1/21/2000 , Brad Guillory wrote:

>I don't understand how a "script kiddie" is going to garner the bandwidth
>to run an attack into the multi-megabit range.  This is not a leveraged
>attack (right?).  What kind of packet rate are we talking about to reboot
>a system, I understand that this will depend on the equipment, but I am
>interested in any numbers that would allow me to evaluate the real impact
>that this DOS will have.  Most people that have enough bandwidth to launch
>a multi-megabit attack have better things to do than (or is it then) to pick
>on me.

Have you ever heard of Tribe Flood Network? Stacheldraht? It's possible to
HIJACK the bandwidth from all over the net. Your upstream ISP's router
focuses the attack on your system like a magnifying glass gathering
the sun's rays.

--Brett



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.2.20000121163754.0198a470>