[4247] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: SYN floods (was: does history repeat itself?)

daemon@ATHENA.MIT.EDU (Vektor Sigma)
Mon Sep 9 21:30:57 1996

Date: Mon, 9 Sep 1996 21:29:34 -0400 (EDT)
From: Vektor Sigma <ae687@freenet.carleton.ca>
To: nanog@merit.edu
In-Reply-To: <199609091719.NAA24855@jekyll.piermont.com>

On Mon, 9 Sep 1996, Perry E. Metzger wrote:

> I think its time for the larger providers to start filtering packets
> coming from customers so that they only accept packets with the
> customer's network number on it. 
> 
> Yes, its a load on routers. Yes, its nasty for the mobile IP weenies.
> Unfortunately, the only known way to stop this.

On my private network I can send 600 or more SYN packets to my telnet port 
(w/faked, unreachable source addresses + random seq numbers), yet the 
port doesn't seem to be flooded.

It's a linux box.

The telnet daemon seems to be able to tell the difference between a faked 
packet and a real one.  Even when spoofing from localhost, it reports a 
connection from unknown.

Obviously, there seems to be a solution to this problem.  ??

--
Billy Biggs
Ottawa, Canada

home help back first fref pref prev next nref lref last post