[ Please don't CC: sim@netnation.org any more, his address
bounces at least for me (maybe his site rejects ECN, it is
the most likely problem if it works for other people) ]
"David S. Miller" <davem@redhat.com> writes:
> I think your criticism of the routing cache is not well
> founded.
Well, what would change your mind?
I'll start to listen when you start to demonstrate that you understand
why the input routing cache is there and what problems it solves.
More people will also start to listen when you acutally discuss this
matter on the proper list(s) (which isn't linux-kernel, since
linux-net and netdev@oss.sgi.com are the proper places). Most of the
net hackers have zero time to follow the enourmous amount of traffic
that exists on linux-kernel and picking out the networking bits.
Frankly, I /dev/null linux-kernel from time to time as well.
The fact is, our routing cache slow path is _FAST_. And we garbage
collect routing cache entries, so the attacker's entries are deleted
quickly while the entries for legitimate flows stick around. And
especially during an attack you want your legitimate traffic using the
routing cache.
I've never seen you mention this attribute of how the routing cache
works, nor have I seen you say anything which even suggests that you
are aware of this. You could even make this apparent by proposing a
replacement for the input routing cache. But remember, it has to
provide all of the functionality that is there today.
Nobody has demonstrated that there is a performance problem due to the
input routing cache once the hashing DoS is eliminated, which it is
in current kernels. Take this as my challenge to you. :-)
using FreeBSD is not always an option
Yeah, that dinosaur :-)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/