Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You want people to know how to generate these slow-path DDoS, do ya?

Been there, on both ends, ... within a network accelerator lab.



I spent several years as the lead on what was at the time the most widely deployed DDOS product in the core of the Internet; I do not know what you are talking about. Could you maybe be more specific about why this particular DOS attack requires extreme statekeeping from middleboxes? I don't think it does.


Like. I said, within a network accelerator lab (or in laymen terms, an artificial DDoS whitelab environment for testing middleboxes).




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: