| To: | Gandalf The White <gandalf@xxxxxxxxxxx> |
|---|---|
| Subject: | Re: Fragmentation Attack |
| From: | "David S. Miller" <davem@xxxxxxxxxx> |
| Date: | Sat, 7 Feb 2004 09:45:24 -0800 |
| Cc: | netdev@xxxxxxxxxxx |
| In-reply-to: | <BC4A7E2E.E256%gandalf@digital.net> |
| References: | <BC4A7E2E.E256%gandalf@digital.net> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
On Sat, 07 Feb 2004 11:36:14 -0600 Gandalf The White <gandalf@xxxxxxxxxxx> wrote: > If you want step by step instructions I can provide them. What makes your DoS interesting is whether the attacker needs a lot of bandwidth or not. Ie. if he has to be sitting on your gigabit subnet then the attack isn't interesting. Whereas if he can eat all of the remote systems cpu cycles just being behind a cable modem, that's interesting. Which is it? Also have you done your cpu utilization tests on something a little less ancient than a 450mhz system? How fast was the network? |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Fragmentation Attack, Gandalf The White |
|---|---|
| Next by Date: | Re: Fragmentation Attack, Gandalf The White |
| Previous by Thread: | Fragmentation Attack, Gandalf The White |
| Next by Thread: | Re: Fragmentation Attack, Gandalf The White |
| Indexes: | [Date] [Thread] [Top] [All Lists] |