Closed GoogleCodeExporter closed 9 years ago
Hello,
sorry for coming back to you so late.
After all, I could reproduce your behavior. It looks like it is a problem, if
the IP address you are spoofing is in fact the IP address of the system. In
this case, the OS gets the packet (instead of bonesi), tries to process it and
returns an RST because it is not expected (the OS did not send the SYN).
To overcome this problem, put a different IP in your russkill2_bots.txt file,
e.g. 3.0.21.7. and make sure the server routes this address back to 3.0.21.6 (
e.g. by setting the default GW).
Then, everything works as expected.
Please note, that bonesi was designed to use hundreds or even thousands of
spoofed addresses in order to test a DDoS remediation device very practically.
In the case you only want to use a single IP source address, there might be
better tools for you, e.g. "ab", the Apache HTTP server benchmarking tool.
Original comment by goldstein.iupr
on 5 Sep 2011 at 5:33
Sorry for the late response. It worked after I made the changes that you
suggested. Thanks!
The packet rates that I'm seeing are great. TCP traffic from 1 bot is about 5.5
Mbps, 7.8 Kpps; From 10 bots, it is about 17 Mbps and 31 Kpps on an Intel
TSRMT2 running centos. Fantastic and great work!
Thanks again.
Original comment by keshavap...@gmail.com
on 8 Dec 2011 at 7:23
Original comment by goldstein.iupr
on 13 Dec 2011 at 4:37
Original issue reported on code.google.com by
keshavap...@gmail.com
on 3 Mar 2011 at 9:38