On Thu, May 31, 2012 at 5:50 PM, Pieter Hintjens <[email protected]> wrote:

> On Thu, May 31, 2012 at 5:52 PM, Garrett Smith <[email protected]> wrote:
>
> > Is it possible with 0MQ to ever prevent DoS from attackers flooding a
> > socket with message parts?
>
> One could add black/white listing to the TCP transport. It can be done
> on new connections. it's not robust because you can spoof the IP
> packets. A real DoS protection has to happen at the firewall level.
>

Wasn't there a discussion about a max message size option happening at some
point? So at least you could bound what was sent at a single point? That's
more of a fix for an accidental DoS than a malicious one, but still
helpful.

Ian
_______________________________________________
zeromq-dev mailing list
[email protected]
http://lists.zeromq.org/mailman/listinfo/zeromq-dev

Reply via email to