<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Mon, Jul 20, 2015 at 5:50 AM, Jason A. Donenfeld <span dir="ltr"><<a href="mailto:Jason@zx2c4.com" target="_blank" onclick="window.open('https://mail.google.com/mail/?view=cm&tf=1&to=Jason@zx2c4.com&cc=&bcc=&su=&body=','_blank');return false;">Jason@zx2c4.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">70 Mbps is pretty horrible. That's a tiny amount of bandwidth required<br>
to completely saturate a server and prevent it from handling other<br>
incoming handshakes.</blockquote><div><br></div><div>Horrible compared to what? With SSL/TLS today servers will perform RSA operations for you and can probably do something close to 2500/s per CPU for 2048-bit RSA on a high-end CPU (unless you're talking about things like hardware load balancers with RSA ASICs)</div><div><br></div><div>Pulling off the "THC attack" requires considerably less than 70 Mbps. I think the same thing could be said for most layer 7 DoS in general</div><div><br></div></div>-- <br><div class="gmail_signature">Tony Arcieri<br></div>
</div></div>