Hi Peter,
This sounds very interesting. Does the QOS synrate limiter differentiate
between "real" and "fake" traffic at all? Do you have any Julian tips on
It's _impossible_ to differentiate between malicious and good traffic. End of
story. But you can rate limit incoming SYNs with in ingress policy. Julian gave
you a pointer. This was also discussed about 2 years ago on this list when the
secure_tcp and drop_packet stuff was about to be introduced :)
Best regards,
Roberto Nibali, ratz
--
echo '[q]sa[ln0=aln256%Pln256/snlbx]sb3135071790101768542287578439snlbxq' | dc
|