netdev
[Top] [All Lists]

Re: [announce] [patch] limiting IRQ load, irq-rewrite-2.4.11-B5

To: Alex Bligh - linux-kernel <linux-kernel@xxxxxxxxxxx>
Subject: Re: [announce] [patch] limiting IRQ load, irq-rewrite-2.4.11-B5
From: Benjamin LaHaise <bcrl@xxxxxxxxxx>
Date: Thu, 4 Oct 2001 17:49:45 -0400
Cc: mingo@xxxxxxx, jamal <hadi@xxxxxxxxxx>, linux-kernel@xxxxxxxxxxxxxxx, Alexey Kuznetsov <kuznet@xxxxxxxxxxxxx>, Robert Olsson <Robert.Olsson@xxxxxxxxxxx>, netdev@xxxxxxxxxxx, Linus Torvalds <torvalds@xxxxxxxxxxxxx>, Alan Cox <alan@xxxxxxxxxxxxxxxxxxx>, Simon Kirby <sim@xxxxxxxxxxxxx>
In-reply-to: <302737894.1002234496@[195.224.237.69]>; from linux-kernel@xxxxxxxxxxx on Thu, Oct 04, 2001 at 10:28:17PM +0100
References: <Pine.LNX.4.33.0110031528370.6272-100000@xxxxxxxxxxxxxxxxxxxxx> <302737894.1002234496@[195.224.237.69]>
Sender: owner-netdev@xxxxxxxxxxx
User-agent: Mutt/1.2.5i
On Thu, Oct 04, 2001 at 10:28:17PM +0100, Alex Bligh - linux-kernel wrote:
> In at least one environment known to me (router), I'd rather it
> kept accepting packets, and f/w'ing them, and didn't switch VTs etc.
> By dropping down performance, you've made the DoS attack even
> more successful than it would otherwise have been (the kiddie
> looks at effect on the host at the end).

Then bug the driver author of your ethernet cards or turn the hammer off.  
You're the sysadmin, you know that your system is unusual.  Deal with it.

                -ben

<Prev in Thread] Current Thread [Next in Thread>