Re: ARP table overflow, ENOBUFS, denial of service???.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 12 Jun 2004, Peter Boyle wrote:

> We're round robin sending to > 1024 IP's/MAC's on a subnet,
> kernel version (2.4.20-31.9).

Then you need to increase the neighbor cache size for this interface. See 
/proc/sys/net/ipv4/neigh/ and the neigh_alloc() function.

Preferably both gc_thresh2 and gc_thresh3 should be larger than the number
of hosts you communicate with on the subnet, or at a minimum and the
difference between 2 & 3 should be larger than the number of new hosts you
may try to communicate with per gc interval.

gc_thresh1 does not seem to be used..

> It seems to me that the old arp entries should be evicted and
> replaced rather than having neigh_alloc fail?

It is hard to tell what is best in this border case.. evict known stable 
entries or fail new entries.  Best action is to avoid it to begin with.

Regards
Henrik

-
: send the line "unsubscribe linux-net" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netdev]     [Ethernet Bridging]     [Linux 802.1Q VLAN]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Git]     [Bugtraq]     [Yosemite News and Information]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux PCI]     [Linux Admin]     [Samba]

  Powered by Linux