In the last episode (Feb 09), Ed Gold said:
> After reading the article,
> 
>http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/02/09/MN23532.DTL
> 
> I am wondering if FreeBSD should take any action to protect our
> users. I think it would speak incredibly highly of FreeBSD if Yahoo
> and other "customers" were to have some kind of protection from such
> an attack. My initial thoughts are:
> 
> A web server should know its limitations and not attempt to handle
> more requests than it can manage.  It should invoke a service cutoff

The problem is that for most flood-type DoS attacks, the target machine
doesn't see most of the traffic.  The idea is to flood the
T1/T3/whatever lines, or send enough small packets that the routers are
overwhelmed.  The smart limiting you describe is good for servers that
have relatively few connections that take a lot of CPU each.  I'd say
that most database-backended servers have a similar problem, and do
have per-IP query limits or some other form of restrictions.  The best
(worst?) example of this I can think of is the all-too-common IIS
"HTTP/1.0 Server Too Busy" message.

-- 
        Dan Nelson
        [EMAIL PROTECTED]


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to