Nmap Development mailing list archives

Re: [PATCH] Mass rDNS performance


From: Brandon Enright <bmenrigh () ucsd edu>
Date: Thu, 19 Mar 2009 07:29:29 +0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thu, 19 Mar 2009 00:21:14 -0700 or thereabouts Fyodor
<fyodor () insecure org> wrote:

On Thu, Mar 19, 2009 at 07:19:41AM +0000, Brandon Enright wrote:

When I resolve 16384 randomly generated IPs that all have a reverse
name (I reverse resolved 1 million, extracted 16384 with a name) the
current code is quite a bit slower.

Hi Brandon.  Thanks for helping out with large scale testing of the
patch!  Did you compare the accuracy of the 16,384 reverse-resolves
(e.g. what percentage succeeded, since it sounds like they all should
have in an ideal case) between the patched and unpatched versions?
Performance alone only tells half the story.

Cheers,
-F

I considered that but it looked to me as though both were > 99%
accurate.  I wanted to get some results emailed before I went to bed
and the results weren't fresh in my mind.

I'll re-run the non-patched tests to check accuracy.

Brandon

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAknB9FkACgkQqaGPzAsl94JMFQCbB+VBKI0t2GclS+vIM90+uCnk
N+MAoMDDH+ZGaq8yFI0EnLxtYvKaBQux
=0S05
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: