From mboxrd@z Thu Jan 1 00:00:00 1970 From: Florian Weimer Subject: Re: Route cache performance under stress Date: Wed, 11 Jun 2003 21:48:12 +0200 Sender: netdev-bounce@oss.sgi.com Message-ID: <87he6wbdkz.fsf@deneb.enyo.de> References: <20030610075702.I37165@shell.cyberus.ca> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Jamal Hadi , Pekka Savola , CIT/Paul , "'Simon Kirby'" , "'David S. Miller'" , "netdev@oss.sgi.com" , "linux-net@vger.kernel.org" Return-path: To: ralph+d@istop.com In-Reply-To: (Ralph Doncaster's message of "Tue, 10 Jun 2003 11:29:18 -0400 (EDT)") Errors-to: netdev-bounce@oss.sgi.com List-Id: netdev.vger.kernel.org Ralph Doncaster writes: >> Assuming the attacker has a 100mbps link to you, yes ;-> > > A script kiddie 0wning a box with a FE connection is nothing. During what > was probably the worst DOS I got hit with, one of my upstream providers > said they were seeing about 600mbps of traffic related to the attack. Yes, these numbers keep growing. By today's standards, 6000 Mbps shouldn't be too surprising. 8-( One of the servers I keep running was recently flooded with 1500-byte UDP packets, Fast Ethernet line rate. It definitely happens if your pipes are fat enough.