This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author pitrou
Recipients johzimme, pitrou
Date 2012-01-27.18:24:47
SpamBayes Score 8.924753e-05
Marked as misclassified No
Message-id <1327688555.3358.3.camel@localhost.localdomain>
In-reply-to <C0B8D844FF273B49AA6F0BDA44B9EBD70643F86A@XMB-RCD-102.cisco.com>
Content
> The issue is that the CPU spikes to ~90% utilization for the server
> during the attack, for as long as the attack lasts.  So the theory is
> that Python isn't throttling or processing the malformed packets
> properly.  Copying Renier for any additional info.

I don't know who Renier is, but Python is a programming language and
doesn't integrate a "throttling" facility or ad-hoc protection against
network attacks. Other programming languages will show exactly the same
behaviour. The socket module gives access to the system's low-level
socket operations, it is not a high-level network programming framework.

Besides, truly malformed packets will never get processed by Python,
they will be blocked by the kernel (e.g. because of a checksum failure).
History
Date User Action Args
2012-01-27 18:24:49pitrousetrecipients: + pitrou, johzimme
2012-01-27 18:24:48pitroulinkissue13891 messages
2012-01-27 18:24:47pitroucreate