On 5/17/06, Ariz Jacinto <[EMAIL PROTECTED]> wrote:
it's a tyical DoS where the machine is ovewhelmed by the request regardless if it's XMPP, SMB, HTTP, et.al. better use the "karma" wisely to avoid flooding.
So this "should" be addressable by infrastructure and system design, right? What I'm concerned about really is whether the nature of the actual protocol causes or contributes to the "DoS'ability" of the service, which can be the case. At any rate, the insights are most appreciated. Thanks very much. :) Any other people with experience with XMPP deployments and can talk about it without breaking an NDA? :D -- Dean Michael C. Berris http://3w-agility.blogspot.com/ IT Consultant Mobile: +639287291459 Email: mikhailberis [at] gmail [dot] com _________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List [email protected] (#PLUG @ irc.free.net.ph) Read the Guidelines: http://linux.org.ph/lists Searchable Archives: http://archives.free.net.ph

