[38639] in Kerberos

home help back first fref pref prev next nref lref last post

rate limiting in KDC?

daemon@ATHENA.MIT.EDU (Yegui Cai)
Thu Dec 5 17:09:46 2019

MIME-Version: 1.0
From: Yegui Cai <caiyegui@gmail.com>
Date: Thu, 5 Dec 2019 17:09:21 -0500
Message-ID: <CAJYMFR6jdXq6FA=e+YC+XBb8GSBeEy0Sv5uJUm_7DW_d-c_ivA@mail.gmail.com>
To: <kerberos@mit.edu>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

Hi,
May I ask a quick question? Is there any rate-limited mechanism in KDC? I
am asking for two reasons. First, if there is a DoS attack, I think KDC
needs to have some kind of rate-limiting to eliminate the attack. Am I
right? Secondly, for performance banch marking, if there is a rate-limiting
in place, that will be an upper bound for the performance for instance in
terms of ticket throughput?

Thank you!
Yegui C
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post