| To: | Pekka Savola <pekkas@xxxxxxxxxx> |
|---|---|
| Subject: | Re: [PATCH} ARP auto-sizing for 2.4.24 - 2.4.26-pre3 |
| From: | Andi Kleen <ak@xxxxxxx> |
| Date: | Mon, 15 Mar 2004 23:00:11 +0100 |
| Cc: | "David S. Miller" <davem@xxxxxxxxxx>, timg@xxxxxxx, anton@xxxxxxxxx, netdev@xxxxxxxxxxx, linux-net@xxxxxxxxxxxxxxx |
| In-reply-to: | <Pine.LNX.4.44.0403152350260.6903-100000@netcore.fi> |
| References: | <20040315134412.314b5e23.davem@redhat.com> <Pine.LNX.4.44.0403152350260.6903-100000@netcore.fi> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
> Isn't there a problem when an outside attacker brute-force pings every > IP address in some order? The intent here is to overload the router > to do a lot of ARP/ND requests which result to nothing. Note that the max number of active neighbours per interface is limited. There is a natural limit on how many entries the hash tables can have. The user can increase this with sysctls, but the defaults should be safe. -Andi |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: [PATCH} ARP auto-sizing for 2.4.24 - 2.4.26-pre3, David S. Miller |
|---|---|
| Next by Date: | Re: [PATCH} ARP auto-sizing for 2.4.24 - 2.4.26-pre3, Pekka Savola |
| Previous by Thread: | Re: [PATCH} ARP auto-sizing for 2.4.24 - 2.4.26-pre3, Pekka Savola |
| Next by Thread: | Re: [PATCH} ARP auto-sizing for 2.4.24 - 2.4.26-pre3, Tim Gardner |
| Indexes: | [Date] [Thread] [Top] [All Lists] |