On 5/17/06, Ariz Jacinto <[EMAIL PROTECTED]> wrote:
it's a tyical DoS where the machine is ovewhelmed by the
request regardless if it's XMPP, SMB, HTTP, et.al. better
use the "karma" wisely to avoid flooding.


So this "should" be addressable by infrastructure and system design,
right? What I'm concerned about really is whether the nature of the
actual protocol causes or contributes to the "DoS'ability" of the
service, which can be the case.

At any rate, the insights are most appreciated. Thanks very much. :)

Any other people with experience with XMPP deployments and can talk
about it without breaking an NDA? :D

--
Dean Michael C. Berris
http://3w-agility.blogspot.com/
IT Consultant
Mobile: +639287291459
Email: mikhailberis [at] gmail [dot] com
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to