Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 31 May 2014 15:10:42 +1000
From:      Dewayne Geraghty <dewayne.geraghty@heuristicsystems.com.au>
To:        freebsd-ipfw@freebsd.org
Subject:   Re: kern/189720: [ipfw] [patch] pps action for ipfw
Message-ID:  <53896452.20904@heuristicsystems.com.au>
In-Reply-To: <538948A5.2050003@freebsd.org>
References:  <201405291520.s4TFK124032925@freefall.freebsd.org> <007f01cf7b52$efd8a0c0$cf89e240$@gmail.com> <53889829.6030307@freebsd.org> <000001cf7c18$c6cbd460$54637d20$@gmail.com> <538948A5.2050003@freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
What is the "use case" of this addition?  Is this objective to limit the
mischief on a certain port, for example ntp or port 53?

I can appreciate the need to limit the number of packets during, say a
DDOS event, but I'm struggling with why I would want less that 1 packet
per second. 

Is the idea of pps meant to remove the need of dummynet where it is used
in almost trivial cases?  Though if this were the case, then bps (bits
per second) may be more useful? 

Dewayne.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53896452.20904>