LVS
lvs-users
Google
 
Web LinuxVirtualServer.org

Re: Syn floods and DOS protection

To: lvs-users@xxxxxxxxxxxxxxxxxxxxxx
Subject: Re: Syn floods and DOS protection
From: Roberto Nibali <ratz@xxxxxx>
Date: Tue, 10 Sep 2002 11:55:24 +0200
Hi Peter,

This sounds very interesting.  Does the QOS synrate limiter differentiate
between "real" and "fake" traffic at all?  Do you have any Julian tips on

It's _impossible_ to differentiate between malicious and good traffic. End of story. But you can rate limit incoming SYNs with in ingress policy. Julian gave you a pointer. This was also discussed about 2 years ago on this list when the secure_tcp and drop_packet stuff was about to be introduced :)

Best regards,
Roberto Nibali, ratz
--
echo '[q]sa[ln0=aln256%Pln256/snlbx]sb3135071790101768542287578439snlbxq' | dc



<Prev in Thread] Current Thread [Next in Thread>