[27084] in North American Network Operators' Group
Re: Congestion or regression testing DDoS
daemon@ATHENA.MIT.EDU (J.D. Falk)
Wed Feb 9 03:59:45 2000
Date: Wed, 9 Feb 2000 00:55:46 -0800
From: "J.D. Falk" <jdfalk@cybernothing.org>
To: Sean Donelan <sean@donelan.com>
Cc: nanog@merit.edu
Message-ID: <20000209005546.B26292@cybernothing.org>
Mail-Followup-To: Sean Donelan <sean@donelan.com>, nanog@merit.edu
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
In-Reply-To: <20000209063040.16135.cpmta@c004.sfo.cp.net>; from Sean Donelan on Tue, Feb 08, 2000 at 10:30:40PM -0800
Errors-To: owner-nanog-outgoing@merit.edu
On 02/08/00, Sean Donelan <sean@donelan.com> wrote:
> If you think of it as "congestion" instead of a DoS, are there any tools
> we use to control congestion which could be adapted to lessen the effects
> of a DoS? Would RED(and RED variations), rate limiting, or any of the
> many QoS knobs help?
Sure, just get all the attackers to set the lowest priority
QoS on their packets....
---------========== J.D. Falk <jdfalk@cybernothing.org> =========---------
| "There are two major products that come out of Berkeley: |
| LSD and [BSD] UNIX. We don't believe this to be a coincidence." |
| -- Jeremy S. Anderson |
----========== http://www.cybernothing.org/jdfalk/home.html ==========----