On Thu, May 31, 2012 at 5:50 PM, Pieter Hintjens <[email protected]> wrote:
> On Thu, May 31, 2012 at 5:52 PM, Garrett Smith <[email protected]> wrote: > > > Is it possible with 0MQ to ever prevent DoS from attackers flooding a > > socket with message parts? > > One could add black/white listing to the TCP transport. It can be done > on new connections. it's not robust because you can spoof the IP > packets. A real DoS protection has to happen at the firewall level. > Wasn't there a discussion about a max message size option happening at some point? So at least you could bound what was sent at a single point? That's more of a fix for an accidental DoS than a malicious one, but still helpful. Ian
_______________________________________________ zeromq-dev mailing list [email protected] http://lists.zeromq.org/mailman/listinfo/zeromq-dev
