[4296] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: SYN floods continue

daemon@ATHENA.MIT.EDU (Avi Freedman)
Wed Sep 11 13:13:48 1996

From: Avi Freedman <freedman@netaxs.com>
To: jtk@nap.net (Joseph T. Klein)
Date: Wed, 11 Sep 1996 13:11:03 -0400 (EDT)
Cc: jon@branch.com, alexis@panix.com, nanog@merit.edu
In-Reply-To: <199609111604.LAA24176@Bluebill.nap.net> from "Joseph T. Klein" at Sep 11, 96 11:04:18 am

> > I don't know, but since nobody else seems to either, how about a 
> > router box that detects excessive SYN activity and then automatically 
> > blocks that ip address for awhile?  I suppose it just means that
> > the attacker has to vary the source address rapidly.
> > 
> If they modulate the phasers we just need to modulate the sheilds. :-O
> 
> If someone comes up with a good solution we will be glad to impliment it.
> -- 
> /*Joseph T. Klein         *    Keep Cool, but Don't Freeze
> * NAP.NET, LLC            *
> * phone  +1 414 747-8747  *                    - Hellman's Mayonnaise
> * http://www.nap.net     */

Well, it's a good analogy (modulating the phasers).
But they're *randomizing* the phasers...

Avi

home help back first fref pref prev next nref lref last post