On Sun, Jun 10, 2007 at 09:23:14PM +0100, Justin Mason wrote:

> Marc A. Donges writes:
> > sa-update being started from cron.daily is probably a DoS attack against
> > Spamassassin update servers.

> Actually, we can handle it just fine.  We know what we're doing ;)

I'm not sure we can right now. (The architecture is there so that we
could handle it if we wanted to, but we'd better mitigate it if
possible.)

[12:59pm] duncf: felicity: are you around?
[12:59pm] felicity: duncf: I'm loosely around.  how's it going?
[12:59pm] duncf: pretty good... just had a question for you about sa-update
[1:00pm] felicity: sure
[1:00pm] duncf: can you please take a look at http://bugs.debian.org/428319
[1:00pm] duncf: basically the question is how ddos proof sa-update is
[1:01pm] felicity: well, there are multiple layers to that question. 
[1:02pm] duncf: well... the dns bit is pretty robust
[1:02pm] felicity: I fully agree with the reporter that the cron job should be 
"randomized" across a larger time period.
[1:02pm] duncf: but the other two bits arent very
[1:03pm] duncf: yeah, the only problem with that is for users that rely on 
anacron
[1:04pm] felicity: so yeah, I'm not worried about the dns bit,
[1:04pm] felicity: the http serving of the updates can be resilient if setup 
that way.
[1:04pm] felicity: right now, it's just my server iirc.
[1:04pm] duncf: yeah
[1:04pm] felicity: so that's not so great.

I guess the question is, to a certain extent, how many people use
anacron, and how many don't. If anacron is used, this shouldn't be a
problem.

-- 
Duncan Findlay

Attachment: pgpvrIhGkWre2.pgp
Description: PGP signature

Reply via email to