Alexandre Dulaunoy wrote:
> On Wed, Dec 22, 2010 at 4:09 PM, Loic Dachary <l...@dachary.org> wrote:
>
>   
>> Hi,
>>
>> In an attempt to better understand how to follow the
>> http://www.rfc-editor.org/rfc/rfc3552.txt recommendations for "Denial of
>> Service Countermeasures", I looked into photuris as described in
>> http://tools.ietf.org/html/rfc2522
>>
>> I found indications of a reference implementation at
>> http://www.citi.umich.edu/u/provos/photuris/
>> but "cvs -d anon...@anoncvs.uk.openbsd.org:/cvs -z 9 get
>> src/sbin/photurisd" is outdated.
>>
>> Does anyone know of a better source ?
>>
>> Cheers
>>
>>
>>     
>
> Maybe you are referencing to all the techniques based
> on "cookies" approaches.
>
> http://en.wikipedia.org/wiki/SYN_cookies
>
> There are some papers related to the DoS
> protection of protocols based on UDP or "stateless" protocols.
>
> Many key exchange protocols are relying on a first cookie
> exchange to avoid the flooding with rogue/faked IP addresses.
>
> A paper about the topic:
>
> http://www.eecis.udel.edu/~mills/teaching/eleg867b/dos/p2-kaufman.pdf
>
>   
Thanks for the pointers. I updated
http://www.seeks-project.info/wiki/index.php/Security#Denial_of_Service_Attacks_and_Countermeasures
> I always enjoy the term "Denial of Services Countermeasure" ;-)
>   
I did not realize I was making a joke but I can see why now ;-)

Cheers

<<attachment: loic.vcf>>

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to