Matt Sergeant wrote:

On 6 Mar 2005, at 04:06, Bob wrote:

Would this mean any change for pperling plugins?


It shouldn't do.

I'd like to have qpsmtpd and gatling and tinydns
running faster than wire speed, beat the ddossing
maggots that way.


Not sure how you have things running faster than wire speed, but whatever floats your boat :-)

...slow wire! About the KBytesps you were testing.

Could you fork off a tarpit, qpsmtpd DONE, and

Tarpitting is trivial with this setup - no need to fork off and forget it because extra connections don't use up any more CPU/memory, so you just keep hold of the connection and tarpit for as long as you want.

[Though I do need to write a tarpit module to do this, but it's like 20 lines of code]

Matt.

Experience informs us that will not mean too many extra connections(double max connect, so what), and it just needs to handle a reset once in a while to convince the mark to stay with us until our choice of timeout. People are saying they can tarpit connections for days, and many aren't even smart enough to request at intervals --tarpitting cause somebody to realize they have a trojaned pc.

All a big ISP would need to survive a bulk flood would
be something like a twenty second tarpit. Allegedly half
of the connections can be finessed to hang on for days
with reset support, honeypots should do that.

My aim is to tarpit the dictionary scans to pre-occupy
their scouts, their eyes, and to make them expose more
IP's during dictionary scans, as well as more cycles.
I guess they can play "assymetrical", too, though.

It's better to honeypot tarpit than greylist the first
attempt, because too many are too stupid to come
back, but stupid enough to hang around, tarpitted.
Rule one,"When in doubt, fail to do no harm".

-Bob



Reply via email to