Re: [netsniff-ng] TCP-SYN Flood Config file

2015-11-30 Thread Daniel Borkmann

On 11/30/2015 01:02 PM, Burak Özalp wrote:
...

I realized that i use v0.5.8 in CentOS 7. İ tested with v0.6.0 with 12 core and 
finally i can manage to send 6 Mpps without any flags(with Jasper adjusted 
syn_attack config file) !


Nice to hear! Thanks!

--
You received this message because you are subscribed to the Google Groups 
"netsniff-ng" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to netsniff-ng+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [netsniff-ng] TCP-SYN Flood Config file

2015-11-28 Thread Eric Dumazet
On Sat, 2015-11-28 at 13:56 +0200, Burak Özalp wrote:
> Hello again,
> 
> First thank you for your support. I did these configurations.
>    Threw more CPU with --cpu 24
>    Applied basic tuning for network overload testing(Mr.Jesper)
> (including upgrading kernel to 3.15) 
>    Test with optimized syn_flood.cfg
> (https://github.com/netoptimizer/network-testing/blob/master/trafgen/syn_attack01.trafgen)
>  with adjusted settings 
>  
> With these options current pps is 2.5 Million. 
> 
> I attached sysctl.out and config file of kernel.
> 
> Why I couldn't manage to see 12Mpps as Jesper ? 
> 
> Best Regards
> Burak Özalp
> 

Proper multiqueue settings, like IRQ properly setup ?

Using 4 cpus 'only' I get at least 4 Mpps.


-- 
You received this message because you are subscribed to the Google Groups 
"netsniff-ng" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to netsniff-ng+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [netsniff-ng] TCP-SYN Flood Config file

2015-11-27 Thread Daniel Borkmann

On 11/27/2015 08:57 AM, Burak Özalp wrote:

Hi everyone;

First of all, you've done great job with netsniff-ng!Congrulations!
I want to use trafgen to simulate an syn_flood attack. In --help, i saw that

"  trafgen --dev eth0 --conf tcp_syn.cfg -u `id -u bob` -g `id -g bob`"

command. Could you please share tcp_syn.cfg file?


Did you try:

  trafgen -e > tcp_syn.cfg

It has a built-in example for getting started. You can test it with:

  trafgen -e | trafgen -i - -o eth0 --cpp -n 1

If you want to analyse the packet on TX (a la wireshark), you need to:

  trafgen -e | trafgen -i - -o eth0 --qdisc-path --cpp -n 1

Cheers,
Daniel

--
You received this message because you are subscribed to the Google Groups 
"netsniff-ng" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to netsniff-ng+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[netsniff-ng] TCP-SYN Flood Config file

2015-11-27 Thread Burak Özalp

Hi everyone;

First of all, you've done great job with netsniff-ng!Congrulations!
I want to use trafgen to simulate an syn_flood attack. In --help, i saw 
that


"  trafgen --dev eth0 --conf tcp_syn.cfg -u `id -u bob` -g `id -g bob`"

command. Could you please share tcp_syn.cfg file?

Best Regards
Burak Ozalp

--
You received this message because you are subscribed to the Google Groups 
"netsniff-ng" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to netsniff-ng+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [netsniff-ng] TCP-SYN Flood Config file

2015-11-27 Thread Daniel Borkmann

On 11/27/2015 11:01 AM, Burak Özalp wrote:

Thank you! I edited the data part and at most i could send 1.800.000 packets 
per second. Does it possible to increase the pps ? I think that netsniff-ng is 
a good alternative to netmap, especially about tcp_syn flood attacks.


Hmm, likely depends on your network tuning and hardware, people have
reported to get ~6Mpps on TCP SYNs:

https://www.mail-archive.com/netdev@vger.kernel.org/msg87192.html

What kernel/settings do you have for fine-tuning?


On 27-11-2015 11:13, Daniel Borkmann wrote:

On 11/27/2015 08:57 AM, Burak Özalp wrote:

Hi everyone;

First of all, you've done great job with netsniff-ng!Congrulations!
I want to use trafgen to simulate an syn_flood attack. In --help, i saw that

"  trafgen --dev eth0 --conf tcp_syn.cfg -u `id -u bob` -g `id -g bob`"

command. Could you please share tcp_syn.cfg file?


Did you try:

  trafgen -e > tcp_syn.cfg

It has a built-in example for getting started. You can test it with:

  trafgen -e | trafgen -i - -o eth0 --cpp -n 1

If you want to analyse the packet on TX (a la wireshark), you need to:

  trafgen -e | trafgen -i - -o eth0 --qdisc-path --cpp -n 1

Cheers,
Daniel




--
You received this message because you are subscribed to the Google Groups 
"netsniff-ng" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to netsniff-ng+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.