Date: Sun, 12 Jan 2003 03:59:50 -0500 (EST) From: Jason Hunt <leth@primus.ca> To: Michael <mike@unixhideout.com> Cc: freebsd-questions@FreeBSD.ORG Subject: RE: dos attack Message-ID: <20030112034244.E31384-100000@lethargic.dyndns.org> In-Reply-To: <3100.192.168.1.10.1041810566.squirrel@email.unixhideout.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 5 Jan 2003, Michael wrote: > Thanks for all that responded. Your ideas are great but they will just > slow the dos down if even that. I guess no one has either thought of a > true way to stop a DOS or maybe its really impossible because your > allowing them in to begin with. Easier said than done. Some types of attacks such as SYN flooding and smurfs can be prevented, to a point. How can a peice of software determine the difference between legit traffic and traffic intended to bring down your server? It would be very hard to write a program that can tell the difference between someone downloading a large file off your website with a high through-put and someone flooding your services with invalid requests. Even if there was something like that, what are the chances of false positives? Look at all the problems trying to prevent spam. Both of these problems will likely need to be prevented through legislation, not code, before we will really see a declide. Yes, I am referring to Lawrence Lessig's idea for spam control. Anyways, this is not the place for that discussion. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030112034244.E31384-100000>