Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

packet-headers behavior in response to a syn flood #42

Open
pboothe opened this issue Apr 17, 2020 · 2 comments
Open

packet-headers behavior in response to a syn flood #42

pboothe opened this issue Apr 17, 2020 · 2 comments

Comments

@pboothe
Copy link
Contributor

pboothe commented Apr 17, 2020

We should make sure that packet-headers behaves no worse than the operating system with which it is surrounded in response to a SYN flood.

@robertodauria
Copy link
Contributor

robertodauria commented Nov 12, 2024

Some work to improve memory usage and number of goroutines has been done here: https://github.com/m-lab/dev-tracker/issues/800 (#57)

We could further improve it by adding a filter to ignore flows from IP addresses that have been sending too many SYNs in a short time, to entirely prevent spawning goroutines and allocating memory to handle them. The filtering could be done at the application level or (if this is possible at all) updating the BPF filter during capture.

@robertodauria
Copy link
Contributor

Additional step in the direction of improving packet-headers' behavior under SYN floods: #58

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants