03-10-2011
That's actually much much easier, and possible without a daemon, because having a host in the middle lets you control traffic both ways just by delaying outgoing packets; it's easy to control what you send but difficult to control what you receive. Linux can throttle outgoing traffic natively, even on routed traffic. It's done in terms of priority and bandwidth, not fixed delays though. See "hierarchical token bucket" aka htb.
This User Gave Thanks to Corona688 For This Post:
9 More Discussions You Might Find Interesting
1. Red Hat
I have a linux redhat box , our security department in my company informed me that my server's IP sends So many traffic in my network ,
This box I am using it as FTP server to store the other servers logs .
My question briefly is how to check my outbound packets which are going from my PC to the... (1 Reply)
Discussion started by: DarkSoul
1 Replies
2. Cybersecurity
Hello,
I am currently trying to limit incoming UDP length 20 packets on a per IP basis to 5 a second using IPTables on a Linux machine (CentOS 5.2).
Basically, if an IP is sending more than 5 length 20 UDP packet a second to the local machine, I would like the machine to drop the excess... (1 Reply)
Discussion started by: tomboy123
1 Replies
3. UNIX for Dummies Questions & Answers
Hi all,
I am new to Linux kernel.
we have a c file that counts the no. of sends and received packets in each interface, and indicate the user about the error/drop ration of incoming and outgoing packets.
in our Linux box , the incoming packets are dropped at random interval.
we have our... (1 Reply)
Discussion started by: kannandv
1 Replies
4. IP Networking
hello,
i am searching a way to delay the incoming packets before it goes out of the system may i know how can i approach to this problem? (3 Replies)
Discussion started by: sameer kulkarni
3 Replies
5. Linux
I am looking for an iptables command to allow incoming UDP packets for my Linux server
also is there a command I can use to set the default action for outgoing packets to accept?
Thank you (1 Reply)
Discussion started by: crimputt
1 Replies
6. Cybersecurity
Hi!
I have a debian linux VPS and i am wondering how would someone be able to hack into it , in what ways ?
I've asked a more knowledgeable friend and he said the only way someone would be able to get into my VPS is via FTP or SSH, are there some other ways someone can enter my machine ?
I... (18 Replies)
Discussion started by: ParanoiaUser
18 Replies
7. IP Networking
Hello, I'm trying to route all packets arriving at a particular interface by entering the same interface
the virtual interface eth1: 2 and now everything is routed by default gw configured on eth1.
eth1 Link encap:Ethernet HWaddr 0a:0e:64:18:52:72
inet addr:192.168.10.15
eth1:2 ... (1 Reply)
Discussion started by: faka
1 Replies
8. Red Hat
HI,
I have a Centos linux box and there is interface connect to internet.
I stop the iptables in this box .
After a few day , I find the linux box have been hacked and install some perl script into the box .
Could anyone tell me how the hacker can login into the centos box without knowing... (1 Reply)
Discussion started by: chuikingman
1 Replies
9. IP Networking
Hi folks,
I have a debian server running an Apache daemon on the eth0 interface. Now from time to time the server has to open an openvpn connection (tun0) to other networks to get some data from there. During this period the Apache is no longer reachable under it's IP address on eth0 because all... (6 Replies)
Discussion started by: flyingwalrus
6 Replies
spray(1M) System Administration Commands spray(1M)
NAME
spray - spray packets
SYNOPSIS
/usr/sbin/spray [-c count] [-d delay] [-l length] [-t nettype] host
DESCRIPTION
spray sends a one-way stream of packets to host using RPC, and reports how many were received, as well as the transfer rate. The host argu-
ment can be either a name or an Internet address.
spray is not useful as a networking benchmark, as it uses unreliable connectionless transports, UDP for example. spray can report a large
number of packets dropped when the drops were caused by spray sending packets faster than they can be buffered locally, that is, before the
packets get to the network medium.
OPTIONS
-c count Specify how many packets to send. The default value of count is the number of packets required to make the total stream
size 100000 bytes.
-d delay Specify how many microseconds to pause between sending each packet. The default is 0.
-l length The length parameter is the numbers of bytes in the Ethernet packet that holds the RPC call message. Since the data is
encoded using XDR, and XDR only deals with 32 bit quantities, not all values of length are possible, and spray rounds up to
the nearest possible value. When length is greater than 1514, then the RPC call can no longer be encapsulated in one Ether-
net packet, so the length field no longer has a simple correspondence to Ethernet packet size. The default value of length
is 86 bytes, the size of the RPC and UDP headers.
-t nettype Specify class of transports. Defaults to netpath. See rpc(3NSL) for a description of supported classes.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWrcmdc |
+-----------------------------+-----------------------------+
SEE ALSO
rpc(3NSL), attributes(5)
SunOS 5.10 6 Nov 2000 spray(1M)