-
Notifications
You must be signed in to change notification settings - Fork 105
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTTP QoS for asymmetric DDoS mitigation #100
Comments
Linked with #116, so move it to 0.5 as crucial task. |
Number of TIME_WAIT & FIN_WAIT2 connections must be properly controlled and efficiently evicted (either using sysctl's at script layer or classifier from #488). All data relating to evicted connection (e.g. TfwClient which has only one the connection) must be properly freed. This requirement depends on #235. We also must implement default and Timers from #387 must be integrated with the eviction strategy for TfwCliConnection and TCP window calculation (#488). |
To cope with DDoS attacks which are indiscernible from real flashcrowds, local stress module (
stress/sys.c
) detect that local system (on which Tempesta is running) is overloaded. When a stressmodule decides that overloading occurred it should call generic classification logic, which shrinks current
connections list. A classifier assigns weights to currently established connections depending on how
much stress a connection causes to the system. The mostly aggressive connections are closed.
The stress module must measure current memory consumption, internal queues size, latencies and few other metrics. All the metrics must be configurable and if some of them are greater than specified limits, then the system stress is reported and Tempesta should evict connections. The weights are assigned to connections also depending on the values of the measures.
The text was updated successfully, but these errors were encountered: