Message152109
| Author |
pitrou |
| Recipients |
johzimme, pitrou |
| Date |
2012年01月27日.18:24:47 |
| SpamBayes Score |
8.924753e-05 |
| Marked as misclassified |
No |
| Message-id |
<1327688555.3358.3.camel@localhost.localdomain> |
| In-reply-to |
<C0B8D844FF273B49AA6F0BDA44B9EBD70643F86A@XMB-RCD-102.cisco.com> |
| Content |
> The issue is that the CPU spikes to ~90% utilization for the server
> during the attack, for as long as the attack lasts. So the theory is
> that Python isn't throttling or processing the malformed packets
> properly. Copying Renier for any additional info.
I don't know who Renier is, but Python is a programming language and
doesn't integrate a "throttling" facility or ad-hoc protection against
network attacks. Other programming languages will show exactly the same
behaviour. The socket module gives access to the system's low-level
socket operations, it is not a high-level network programming framework.
Besides, truly malformed packets will never get processed by Python,
they will be blocked by the kernel (e.g. because of a checksum failure). |
|
History
|
|---|
| Date |
User |
Action |
Args |
| 2012年01月27日 18:24:49 | pitrou | set | recipients:
+ pitrou, johzimme |
| 2012年01月27日 18:24:48 | pitrou | link | issue13891 messages |
| 2012年01月27日 18:24:47 | pitrou | create |
|