[4137] in linux-net channel archive

home help back first fref pref prev next nref lref last post

Re: SYN floods

daemon@ATHENA.MIT.EDU (Speed Racer)
Thu Aug 22 03:14:07 1996

Date: 	Thu, 22 Aug 1996 02:20:44 -0400 (EDT)
From: Speed Racer <shagboy@dns.bluesky.net>
To: nelson@crynwr.com
cc: linux-net@vger.rutgers.edu
In-Reply-To: <19960822055645.317.qmail@ns.crynwr.com>

On 22 Aug 1996 nelson@crynwr.com wrote:

>  > I say again, I think it's up to the individual ISP to watch out for
>  > themselves - if they are getting SYN-flooded, make a few phone
>  > calls or send a nasty letter to the attacker's provider.
> 
> Which is????  If the source IP address is being faked, you have NO
> FUCKING CLUE who's sending the packets to you.  The only way to find
> out is to examine the traffic through each router, hop by hop, that
> the packets take to get to you.

Then attempt to trace it back.  If you can't get back in a "reasonable"
amount of time, drop the connection & assume it's spoofed.  You could also
try to reverse DNS the IP - if you can't get a name back, assume it's
spoofed. 

> Maybe some major router vendor (whoever THAT might be) needs to put in
> code that recognizes an abnormally large number of SYN packets, and
> sends a new ICMP packet to the destination IP address, saying
> "excessive SYNs seen".

I have an even better idea - rather than rely on the vendors, let's put it
in the Linux IP code.  (I do agree with you that the vendors SHOULD do
that, but I don't really think they're going to)

shag

Judd Bourgeois      | When we are planning for posterity,
shagboy@bluesky.net | we ought to remember that virtue is
Finger for PGP key  | not hereditary.        Thomas Paine


home help back first fref pref prev next nref lref last post