[4110] in linux-net channel archive

home help back first fref pref prev next nref lref last post

Re: SYN floods

daemon@ATHENA.MIT.EDU (nelson@crynwr.com)
Tue Aug 20 12:40:54 1996

Date: 	20 Aug 1996 15:30:18 -0000
From: nelson@crynwr.com
To: linux-net@vger.rutgers.edu
In-Reply-To: <199608201510.PAA11624@sliderule.geek.org.uk>

Lefty writes:
 > > What is supposed to solve it is that a) any competent provider and
 > > backbone providers links should be filtering frames with a bogus source
 > > address and b) because of that you know where the frames really came
 > > from.
 > 
 > Well, I dont think that this is the total solution..  All a Syn flooder
 > requires is a valid routable address with no machine atached to it..
 > while 1.2.3.4 works, you will prolly   get a host unreachable or network
 > unreachable, which will kill the connect..  However how many ISP's have
 > dynamic IP's that arent in use?  It would be very easy for me to find 
 > a couple and syn flood from that, how would a provider know to block those
 > IP's?  And with the new small almost clueless new ISP's that are going
 > up, its not conceivable that the provider can block their own addrs as that
 > isnt a default install..

I don't think you understand.  All that needs happen is that, e.g., my
provider should block all source addresses that it doesn't have a
destination route to.  So for my network, if it doesn't say "from
192.203.178.*", it doesn't pass my router.  In other words, it should
prohibit non-symmetric routing.

-russ <nelson@crynwr.com>    http://www.crynwr.com/~nelson
Crynwr Software sells packet driver support     | PGP ok
521 Pleasant Valley Rd. | +1 315 268 1925 voice | Corporations persuade;
Potsdam, NY 13676       | +1 315 268 9201 FAX   | governments coerce.

home help back first fref pref prev next nref lref last post