On Sat, 9 Oct 2010, Tony Graziano wrote:

> http://blog.myitdepartment.net/?p=124

I think the problem rather points up a need for thinking 
through, and adding a range of in-product rate limiting of 
various type -- per source IP, wrappreing per netblocks, per 
real-time failure stats, and so forth, in free-switch

The Linux kernel will fall back to a more restrictive 'new 
session' approach when it sees a TCP 'half-open' attack, and 
so forth -- same basic idea here

-- Russ herrold
_______________________________________________
sipx-users mailing list
[email protected]
List Archive: http://list.sipfoundry.org/archive/sipx-users/

Reply via email to