[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
- To: email@example.com (inferno)
- Subject: flooding
- From: firstname.lastname@example.org (Porttikivi Anssi NRC/Hki)
Recent happenings on the Internet have raised concern over "malicious flooding", especially flooding a server with forged-client-addressTCP connection initialize messages for various protocols like HTTP, Telnet and SMTP. Is Styx in any way better in this than TCP? Could there be some kind of built-in discard mechanism in responding to sudden inward rush of traffic? Inferno probably has not fixed everything concerning this issue, so I am raising it here. Does anyone know any articles treating flooding as a general problem? How can the initializer be forced to authenticate himself _before_ he is given enough of attention to consume receiver resources. I guess the only solution is to prevent forged-sender-address packets entering to the network at all. A hard task which requires updating of lot of router software in todays Internet.