Trial fix for Achim's bug

Hal Murray hmurray at megapathdsl.net
Wed Jan 16 23:11:07 UTC 2019


We should put KoD and rate limiting on the think-about list.

Maybe we should just drop them.

Clients generating excessive traffic probably aren't smart enough to process a 
KoD.

With NAT and such, a server can't distinguish a clump of clients sharing an IP 
Address from a broken client.  I have an interesting "client" on a pool server:
 lstint avgint rstr r m v  count rport remote address
=====================================================
  27673  0.252   90 . 3 1 199114 60509 81.105.221.252
whois says it's Prime-Hotels.

They are an opportunity for DDoS, both sending bogus KoDs to the client and 
sending forged requests to the server to get it to reject legitimate traffic.

It's not obvious what the parameters are.  Looks like the code sends back 
ntp_minpoll.  Is that documented?


-- 
These are my opinions.  I hate spam.





More information about the devel mailing list