On Sat, 9 Oct 2010, Tony Graziano wrote: > http://blog.myitdepartment.net/?p=124
I think the problem rather points up a need for thinking through, and adding a range of in-product rate limiting of various type -- per source IP, wrappreing per netblocks, per real-time failure stats, and so forth, in free-switch The Linux kernel will fall back to a more restrictive 'new session' approach when it sees a TCP 'half-open' attack, and so forth -- same basic idea here -- Russ herrold _______________________________________________ sipx-users mailing list [email protected] List Archive: http://list.sipfoundry.org/archive/sipx-users/
