Trial fix for Achim's bug
Hal Murray
hmurray at megapathdsl.net
Wed Jan 16 23:11:07 UTC 2019
We should put KoD and rate limiting on the think-about list.
Maybe we should just drop them.
Clients generating excessive traffic probably aren't smart enough to process a
KoD.
With NAT and such, a server can't distinguish a clump of clients sharing an IP
Address from a broken client. I have an interesting "client" on a pool server:
lstint avgint rstr r m v count rport remote address
=====================================================
27673 0.252 90 . 3 1 199114 60509 81.105.221.252
whois says it's Prime-Hotels.
They are an opportunity for DDoS, both sending bogus KoDs to the client and
sending forged requests to the server to get it to reject legitimate traffic.
It's not obvious what the parameters are. Looks like the code sends back
ntp_minpoll. Is that documented?
--
These are my opinions. I hate spam.
More information about the devel
mailing list