<div dir="ltr"><div class="gmail_extra"><div class="gmail_quote">On Sat, Jan 9, 2016 at 9:55 AM, Jason A. Donenfeld <span dir="ltr"><<a href="mailto:Jason@zx2c4.com" target="_blank">Jason@zx2c4.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">As we know, computing DH is CPU intensive. In order to fend off a<br>
CPU-exhaustion attack, if the server is under load, it may choose to<br>
not process handshake messages, but instead respond with a cookie<br>
reply packet.</blockquote><div><br></div><div>There's something a lot simpler you can do though... you can detect the attack, and rate limit your responses by IP address.</div></div><div><br></div><div>That clearly doesn't work in a DDoS scenario, but if you're getting DDoSed, you'll probably want to be running your traffic through someone like Prolexic anyway who will do more advanced traffic filtering.</div><div><br></div>-- <br><div class="gmail_signature">Tony Arcieri<br></div>
</div></div>