[27084] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Congestion or regression testing DDoS

daemon@ATHENA.MIT.EDU (J.D. Falk)
Wed Feb 9 03:59:45 2000

Date: Wed, 9 Feb 2000 00:55:46 -0800
From: "J.D. Falk" <jdfalk@cybernothing.org>
To: Sean Donelan <sean@donelan.com>
Cc: nanog@merit.edu
Message-ID: <20000209005546.B26292@cybernothing.org>
Mail-Followup-To: Sean Donelan <sean@donelan.com>, nanog@merit.edu
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
In-Reply-To: <20000209063040.16135.cpmta@c004.sfo.cp.net>; from Sean Donelan on Tue, Feb 08, 2000 at 10:30:40PM -0800
Errors-To: owner-nanog-outgoing@merit.edu


On 02/08/00, Sean Donelan <sean@donelan.com> wrote: 

> If you think of it as "congestion" instead of a DoS, are there any tools
> we use to control congestion which could be adapted to lessen the effects
> of a DoS?  Would RED(and RED variations), rate limiting, or any of the
> many QoS knobs help?

	Sure, just get all the attackers to set the lowest priority
	QoS on their packets....

 ---------========== J.D. Falk <jdfalk@cybernothing.org> =========---------
  |  "There are two major products that come out of Berkeley:            |
  |    LSD and [BSD] UNIX.  We don't believe this to be a coincidence."  |
  |                                  -- Jeremy S. Anderson               |
 ----========== http://www.cybernothing.org/jdfalk/home.html ==========----


home help back first fref pref prev next nref lref last post