When a user attempts to connect with an incorrect password, the server tries to decrypt each incoming packet using the passwords of all users, eventually resulting in an error due to the inability to find the correct user.
Each incorrect password attempt, whether it's a TCP connection or a UDP packet, forces the server to repeat this process, significantly increasing the server's CPU usage and degrading the experience for regular users.
If there are many such incorrect password connection attempts, such as in the case of a deliberate attack on the server, the server's CPU usage can become fully saturated, preventing normal users from using the service effectively.
When a user attempts to connect with an incorrect password, the server tries to decrypt each incoming packet using the passwords of all users, eventually resulting in an error due to the inability to find the correct user.
Each incorrect password attempt, whether it's a TCP connection or a UDP packet, forces the server to repeat this process, significantly increasing the server's CPU usage and degrading the experience for regular users.
If there are many such incorrect password connection attempts, such as in the case of a deliberate attack on the server, the server's CPU usage can become fully saturated, preventing normal users from using the service effectively.