From mboxrd@z Thu Jan 1 00:00:00 1970 From: Jamal Hadi Subject: Re: Route cache performance under stress Date: Mon, 19 May 2003 21:23:08 -0400 (EDT) Sender: netdev-bounce@oss.sgi.com Message-ID: <20030519212209.P39592@shell.cyberus.ca> References: <20030519154852.I39024@shell.cyberus.ca> <20030520011053.GB10419@netnation.com> <20030519.181405.35017608.davem@redhat.com> Mime-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Cc: sim@netnation.com, netdev@oss.sgi.com, linux-net@vger.kernel.org Return-path: To: "David S. Miller" In-Reply-To: <20030519.181405.35017608.davem@redhat.com> Errors-to: netdev-bounce@oss.sgi.com List-Id: netdev.vger.kernel.org On Mon, 19 May 2003, David S. Miller wrote: > I bet you have been, the weakness in the hash has been very well > publicized and the script kiddies aren't using the truly random > version of the attacks anymore. Just google for juno-z.101f.c, this > (or some derivative) is the DoS people attack program are actually > using. Also used to attack CISCOs by them kiddies btw. We stand much better than any CISCO doing caching. cheers, jamal