[4119] in linux-net channel archive

home help back first fref pref prev next nref lref last post

Re: SYN floods

daemon@ATHENA.MIT.EDU (Pedro Roque Marques)
Tue Aug 20 19:09:55 1996

Date: 	Tue, 20 Aug 1996 23:14:51 +0100
From: Pedro Roque Marques <roque@di.fc.ul.pt>
To: "Eric Schenk" <schenk@cs.toronto.edu>
Cc: Pedro Roque Marques <roque@di.fc.ul.pt>, linux-net@vger.rutgers.edu
In-Reply-To: <96Aug20.175647edt.15383@dvp.cs.toronto.edu>

>>>>> "Eric" == Eric Schenk <schenk@cs.toronto.edu> writes:


    Eric> I'm not sure an "embroyonic state" solves the problem.
    Eric> There are two things we want to avoid here: (1) running out
    Eric> of memory, (2) having legitimate TCP users locked out.

The idea is to try to reduce the ammount of memory and processing
requirements of a socket in SYN-RECV, allowing you to increase the
number of allowed connection requests.

It is not ment as a solution but rather to raise the water mark higher.
And it targets more the no route back to the host that does a active
open than the attack case.

    Eric> So, what did you have in mind that is not covered by this,
    Eric> and that does not require some non-compatible extension to
    Eric> the TCP protocol?

Only implementation changes.

    Eric> Oh yeah, while I'm on the topic, we currently sit in
    Eric> SYN_RECV way too long, waiting for a sucessful connect.

Are you sure ? We should repect 793 and 1122.

./Pedro.

home help back first fref pref prev next nref lref last post