[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1338452917.2760.1309.camel@edumazet-glaptop>
Date: Thu, 31 May 2012 10:28:37 +0200
From: Eric Dumazet <eric.dumazet@...il.com>
To: Rick Jones <rick.jones2@...com>
Cc: Hans Schillstrom <hans.schillstrom@...csson.com>,
Andi Kleen <andi@...stfloor.org>,
Jesper Dangaard Brouer <jbrouer@...hat.com>,
Jesper Dangaard Brouer <brouer@...hat.com>,
"netdev@...r.kernel.org" <netdev@...r.kernel.org>,
Christoph Paasch <christoph.paasch@...ouvain.be>,
"David S. Miller" <davem@...emloft.net>,
Martin Topholm <mph@...h.dk>, Florian Westphal <fw@...len.de>,
Tom Herbert <therbert@...gle.com>
Subject: Re: [RFC PATCH 2/2] tcp: Early SYN limit and SYN cookie handling
to mitigate SYN floods
On Wed, 2012-05-30 at 14:20 -0700, Rick Jones wrote:
> It may still be high, but a very quick netperf TCP_CC test over loopback
> on a W3550 system running a 2.6.38 kernel shows:
>
> raj@...dy:~/netperf2_trunk/src$ ./netperf -t TCP_CC -l 60 -c -C
> TCP Connect/Close TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to
> localhost.localdomain () port 0 AF_INET
> Local /Remote
> Socket Size Request Resp. Elapsed Trans. CPU CPU S.dem S.dem
> Send Recv Size Size Time Rate local remote local remote
> bytes bytes bytes bytes secs. per sec % % us/Tr us/Tr
>
> 16384 87380 1 1 60.00 21515.29 30.68 30.96 57.042 57.557
> 16384 87380
>
> 57 microseconds per "transaction" which in this case is establishing and
> tearing-down the connection, with nothing else (no data packets) makes
> 19 microseconds for a SYN seem perhaps not all that beyond the realm of
> possibility?
Thats a different story, on loopback device (without stressing IP route
cache by the way)
Your netperf test is a full userspace transactions, and 5 frames per
transaction. Two sockets creation/destruction, process scheduler
activations, and not enter syncookie mode.
In case of synflood/(syncookies on), we receive a packet and send one
from softirq.
One expensive thing might be the md5 to compute the SYNACK sequence.
I suspect other things :
1) Of course we have to take into account the timer responsible for
SYNACK retransmits of previously queued requests. Its cost depends on
the listen backlog. When this timer runs, listen socket is locked.
2) IP route cache overflows.
In case of SYNFLOOD, we should not store dst(s) in route cache but
destroy them immediately.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists