Senior Member
Steam:
76561197979925166 Steam join date: Dec 24, 2005
Steam Level: 44
Profile Status:
Public
![Quote](images/misc/quote_icon.png)
Originally Posted by
TheDopp
Well if the RAM in the router is only 8MB (assuming an older router that's been in the house for a while) the limit is probably 512 or 1024, which even with Windows default behavior of 10 (Honestly have no idea if that was ever changed after XPSP3 since I've been mac since then) that's still Windows saying no - the router is just going to pass the connection attempt along until it's table is full. It's not attacking the router directly, just attacking it being dumb.
Though if I'm way off just tell me and I'll shush. That just always seemed the most logical response in my head to people going 'zomg I've been ddos'd!!11'.
Well when windows rejects the connection it is practically no load on the router, especially compared to heavy gaming or downloading a file, because it basically ignores bogus packets. If you could crash a router by spamming it with too many packets from too many sources then how do you think that people could download torrents from 500+ peers simultaneously at the maximum speed of their Internet connection?
Also keep in mind that routers don't keep every connection in its DHCP table, only those that are connected to the internal network. In fact the reason that home routers themselves are so impervious to denial of service is BECAUSE they are dumb and don't bother with any of the packet shaping or any other advanced networking features that enterprise routers generally would. If they send a packet (or even hundred trillion packets) to a port that isn't forwarded they're all dropped with no increased load on the router whatsoever.
This is why DoS works on websites and servers. Every 'request-packet' you send to a website MUST be responded to tenfold, which creates load for the server. These things all need to be logged and shaped, which creates more load for the server. When you have tens of thousands of request packets it maxes out the server's client capacity (Not it's connection speed, as popular opinion dictates.) and it starts to run out of available CPU cycles, memory, and hard drive space. In a home network when a request-packet is sent the computer drops it and doesn't give it another thought, because it has nothing to respond with.
The only way I've been able to think of that could have crashed his router directly is if he had a custom firmware that he hacked to remove the restriction of remote-management login attempts, and then programmed it to respond to packet-sniffing on every port from an external source or publicly broadcast his remote management port. Basically neither of these things could possibly serve a practical purpose, though, so I assumed if he had the programming knowledge then he wouldn't bother.