Date: Tue, 1 Dec 1998 08:41:10 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: Karl Denninger <karl@Denninger.Net> Cc: Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, John Saunders <john.saunders@scitec.com.au>, freebsd-current@FreeBSD.ORG Subject: Re: RE: D.O.S. attack protection enhancements commit (ICMP_BANDLIM) Message-ID: <199812011641.IAA07525@apollo.backplane.com> References: <005b01be1cf6$e6368da0$6cb611cb@saruman.scitec.com.au> <199812010708.XAA03688@apollo.backplane.com> <199812011619.LAA04055@khavrinen.lcs.mit.edu> <19981201103044.A55812@Denninger.Net>
next in thread | previous in thread | raw e-mail | index | archive | help
:> :> -GAWollman : :20kpps of ICMP traffic?! Surely you jest! I wish I were. The hackers have realized over the last year that sending 80 MBps packet attacks using large packets doesn't work anywhere near as well as sending 80 MBps packet attacks using tiny packets that cause ICMP replies. We upgraded our Cisco border routers to all VIP-2 cards 6 months ago *just* so they wouldn't fall over in an attack and were also one of the first to use Cisco's ICMP reply limiting hack, and now we are upgrading them to whatever the next generation card is ( I forget what these new cards are called ). That takes care of attacks against routers. My ICMP patch takes care of attacks against servers. It's only going to get worse when we upgrade our transit links form T3 to OC3. -Matt :Karl Denninger (karl@denninger.net) http://www.mcs.net/~karl Matthew Dillon Engineering, HiWay Technologies, Inc. & BEST Internet Communications & God knows what else. <dillon@backplane.com> (Please include original email in any response) To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199812011641.IAA07525>