netdev
[Top] [All Lists]

Re: [PATCH} ARP auto-sizing for 2.4.24 - 2.4.26-pre3

To: Pekka Savola <pekkas@xxxxxxxxxx>
Subject: Re: [PATCH} ARP auto-sizing for 2.4.24 - 2.4.26-pre3
From: Andi Kleen <ak@xxxxxxx>
Date: Mon, 15 Mar 2004 23:00:11 +0100
Cc: "David S. Miller" <davem@xxxxxxxxxx>, timg@xxxxxxx, anton@xxxxxxxxx, netdev@xxxxxxxxxxx, linux-net@xxxxxxxxxxxxxxx
In-reply-to: <Pine.LNX.4.44.0403152350260.6903-100000@netcore.fi>
References: <20040315134412.314b5e23.davem@redhat.com> <Pine.LNX.4.44.0403152350260.6903-100000@netcore.fi>
Sender: netdev-bounce@xxxxxxxxxxx
> Isn't there a problem when an outside attacker brute-force pings every 
> IP address in some order?  The intent here is to overload the router 
> to do a lot of ARP/ND requests which result to nothing.

Note that the max number of active neighbours per interface is limited. There
is a natural limit on how many entries the hash tables can have.
The user can increase this with sysctls, but the defaults should be 
safe.

-Andi

<Prev in Thread] Current Thread [Next in Thread>