|This is the talk page for discussing improvements to the Smurf attack article.
This is not a forum for general discussion of the article's subject.
|WikiProject Computing / Networking||(Rated Start-class, Low-importance)|
|WikiProject Computer Security / Computing||(Rated Start-class, Mid-importance)|
|You can help improve this article! Perform a search for up-to-date information by using these search tools:|
It would be really nice to have an etymology for this page. It was called a smurf attack because the source file for the original implementation was called smurf.c. But, why did the author choose that name. I believe the term originated in military slang for a style of amplifier. And I believe the military's term originated in the idea of one smurf (Papa smurf) giving an order, and all the other smurfs saying "Yes, Papa smurf!" and carrying it out. But, I do not know this, it is only a guess. Omnifarious 15:17, 12 June 2006 (UTC)
- Considering that the authors other program for UDP was fraggle.c (Fraggle Rock?), maybe there is no deeper meaning and the author simply chose 80's kids tv shows? — Preceding unsigned comment added by 22.214.171.124 (talk) 19:52, 1 February 2012 (UTC)
- I have done so. We already have a link to the archive.org version of that page, so it isn't really a matter of Wikipedia:Citing sources#What to do when a reference link "goes dead" (although if there are published accounts of how fast systems got fixed, for example in an RFC, CERT publication, etc, that would be worth citing as well). Kingdon 17:25, 16 October 2007 (UTC)
First, much appreciated effort went into this page, most appreciated... but... The more techies of various flavors add to or remove references to tcp/ip four, seven and eleven layer models, the more 98% of the public will gasp. Initial idea is how about an analogy of a clown juggling and another clown juggler starts tossing ball after ball to the main act? At some point, the whole crowd-pleaser aspect of the router (this analogy needs simplify-speak, e.g., web-server, internet backbone devices, etc.). Put a very dumbed down version first, the current intro only impresses IT savants, not the public... Raretrees (talk) 16:53, 22 June 2013 (UTC)
I have removed the Template:technical tag from this page. After looking through Wikipedia:Make technical articles accessible, it seems like what this article mostly needed was a sentence or two of non-technical introduction (which I have added). But I may be too close to the subject matter to know what is accessible and what isn't. If people still think there is a problem here, please be specific about which parts of the article are unclear to people who don't live and breathe TCP/IP, and also what information such people would hope to understand about a smurf attack (I'm assuming we don't want a tutorial-level discussion of IP, ICMP, ping, broadcasts, spoofing, and everything else involved, but just a high level description of what a smurf attack can do). Kingdon 18:17, 16 October 2007 (UTC)
- It was requested that this article be renamed but the procedure outlined at WP:RM#Requesting potentially controversial moves did not appear to be followed, and consensus could not be determined. Please request a move again with proper procedure if there is still a desire for the page to be moved. Thank you for your time!Aervanath lives in the Orphanage 19:48, 24 December 2008 (UTC)
Šmoulové jsou malá stvoření která se dostala do New york a teť jsou v New york a Gargamel dostal taťku šmoulu a chce zněj dostat šmoulí esenci a řekl koumákovi ať udělá modrý měsíc a on to udělal a přivedl do New york zbytek šmoulú a pak spívali lalalalala lalalalala a pak gargamela přelstila celá vesnice ažili až do smrti štastní aveselí konec. — Preceding unsigned comment added by 126.96.36.199 (talk) 12:39, 15 January 2012 (UTC)
Article is incorrect in my opinion
This form of attack doesn't solely relay on echo (ping) request. It can by any other icmp request (timestamp and address mask) — Preceding unsigned comment added by 188.8.131.52 (talk) 21:55, 19 November 2012 (UTC)
- If true, the article would be incomplete, not incorrect, or am I missing something? Also, what you're saying is original research without a proper reference - do you happen to have one where this is described and called a "Smurf attack"? I expect that if it's true, it would not be called a Smurf attack unless it's implemented in smurf.c itself. — SkyLined (talk) 22:17, 5 July 2013 (UTC)