search for: ddose

Displaying 11 results from an estimated 11 matches for "ddose".

Did you mean: dose
2002 Jun 27
1
Building from a source-code library under windows
...{ long int i, j, No = *norow, Nd = *ndrow, LogParam = *logparam, LogResp = *logresp; double Tdiff, a, b, k21, origReset, counterDose, id, T1, constReseti, constResetj, MaxOORDER = *maxoorder, MaxDORDER = *maxdorder, *OTime, *ITIME, *CL, *CLD, *V1, *VSS, *Tlag, *OID, *OORDER, *DTime, *DDose, *DID, *DORDER, *DEVID, *OrigDTime, *OrigDDose, *OrigDID, *OrigDORDER, *OrigDEVID, *tempDTime, *tempDDose, *tempDID, *tempDORDER, *tempDEVID; OTime = OMAT; ITIME = OMAT + No; CL = OMAT + No * 2; CLD = OMAT + No * 3; V1 = OMAT + No * 4; VSS = OMAT + No * 5; Tlag = OMAT + No * 6; OID...
2020 Jul 01
3
13.22.0 - HTTP session count exceeded 100 sessions - instance unusable
Hi Joshua HTTP is used on in our setup on 127.0.0.1/mxml?<command> to send commands to the server, such as http://127.0.0.1/mxml?action=login&username=myuser&secret=thesecret to log in and then http://127.0.0.1/mxml?ActionID=123&Action=BlindTransfer&Channel=Channel&Context=local&Exten=123&Priority=1 etc. to control transfers, for example. ARI is not being
2020 Jul 01
1
13.22.0 - HTTP session count exceeded 100 sessions - instance unusable
Hi Joshua No back-off, but I am caching the last 5000 results and and first hitting the cache to see if a recent command already provided the information I'm seeking for a particular request. I'll see if I can do some simulation and see if I'm effectively DDOSing the local HTTP interface. I'll have to see if I maybe have a resource leak in my code that makes the HTTP request,
2015 Jul 30
3
Fedora change that will probably affect RHEL
...ch is a problem of engineering design of how the network operates (untrusted anything can talk to untrusted anything) > > I?m not sure how you mean that comment. > > If you?re saying that the Internet is badly designed and that we need to rip it up and replace it before we can address DDoSes, you?re trying to boil the ocean. We have real-world practical solutions available to us that do not require a complete redesign of the Internet. One of those is to tighten down CentOS boxes so they don?t get coopted into botnets. > > If instead you?re saying that DDoSes are solvable with...
2015 Jul 28
3
Fedora change that will probably affect RHEL
> On Jul 28, 2015, at 11:27, Warren Young <wyml at etr-usa.com> wrote: > > On Jul 25, 2015, at 6:22 PM, Bob Marcan wrote: >> >> 1FuckingPrettyRose >> "Sorry, you must use no fewer than 20 total characters." >> 1FuckingPrettyRoseShovedUpYourAssIfYouDon'tGiveMeAccessRightFuckingNow! >> "Sorry, you cannot use punctuation."
2015 Jul 29
0
Fedora change that will probably affect RHEL
...Other than DDoS which is a problem of engineering design of how the network operates (untrusted anything can talk to untrusted anything) I?m not sure how you mean that comment. If you?re saying that the Internet is badly designed and that we need to rip it up and replace it before we can address DDoSes, you?re trying to boil the ocean. We have real-world practical solutions available to us that do not require a complete redesign of the Internet. One of those is to tighten down CentOS boxes so they don?t get coopted into botnets. If instead you?re saying that DDoSes are solvable with ?just? a...
2009 Jul 29
9
Quagga on Xen - Latency / Bandwidth?
I was wondering if anyone is running Quagga on Xen? What is throughput/latency like? Was looking for about a gig of mixed packet size BGP throughput. Hardware is Opteron 4 Way Quad cores, was thinking paravirt with a couple of dedicated cores and maybe the addition of Solarflare 10GB Direct IO NICs might give the required performance level but I am unsure. The other option is multi-queue Intel
2020 Jul 01
0
13.22.0 - HTTP session count exceeded 100 sessions - instance unusable
...32 minutes. > > Or am I barking up the wrong tree? > It's possible it will help - but that still doesn't explain what exactly happened. Does your code have a back off strategy if HTTP requests fail? If not and they have an immediate retry with loop, then that may have effectively DDoSed things. It would also be good to explain why 100 connections were in use - did old connections not get closed? Was your load sufficient to just meet that amount? -- Joshua C. Colp Asterisk Technical Lead Sangoma Technologies Check us out at www.sangoma.com and www.asterisk.org -------------- nex...
2010 Dec 07
1
limit login concurencly from different ip
Hi, can i configure dovecot to limit the max number of login concurencly? I read in documentation that there is "mail_max_userip_connections", but in this way i limit the login that come from same ip. If the same user tries to connect from different ip, he succeeds. Can i do it? Thanks
2012 Aug 20
2
DDoS
I know someone who for the past 4 days has been having the heck ddosed out of him. He runs a gaming server, and ran a report on the ddos; he has 8 pages of that and a few hours ago there were 16 pages. They''re attacking his machine on random ports and he blocks UDP traffic on those ports, but they keep attacking on other ports. So far he''s banne...
2015 Jul 30
0
Fedora change that will probably affect RHEL
...the DDoS attack, and you either get blown off or transferred to their sales department to buy a ?solution? to a problem they allow to exist because it brings in extra revenue. Your ISP could block this kind of thing at its border. Your ISP could also use their alliances with fellow ISPs to block DDoSes at their source. They do neither. >> fail2ban isn?t in the stock package repo for CentOS 7 > > Didn?t realize that. Brilliant move, removing it? (rolls eyes at RH)? It wasn?t removed. fail2ban has *never* been in the stock CentOS package repos. It?s always been a third-party thin...