[4182] in linux-net channel archive

home help back first fref pref prev next nref lref last post

Re: SYN floods

daemon@ATHENA.MIT.EDU (Racer X)
Sun Aug 25 03:16:19 1996

Date: 	Fri, 23 Aug 1996 18:24:39 -0400 (EDT)
From: Racer X <shagboy@wspice.com>
Reply-To: shagboy@bluesky.net
To: nelson@crynwr.com
cc: linux-net@vger.rutgers.edu
In-Reply-To: <19960822062855.650.qmail@ns.crynwr.com>

On 22 Aug 1996 nelson@crynwr.com wrote:

>  > If you can't get back in a "reasonable" amount of time, drop the
>  > connection & assume it's spoofed.  You could also try to reverse
>  > DNS the IP - if you can't get a name back, assume it's spoofed.
> 
> There are WAY too many hosts that have no reverse mapping.

Then that's THEIR problem.  I couldn't connect to a good number of FTP 
sites because they couldn't reverse my IP.  I sent mail to my provider & 
bugged them on the phone for a week, and they still didn't make the DNS 
changes, so I switched providers.

Everyone SHOULD have a reverse DNS mapping.  Period.  Isn't there some RFC
somewhere that says all connected hosts' IP's should correspond to a name?

If you don't want to deny people that for some reason don't have a reverse
map, then you can still get some usefulness out of this idea - people who DO
have a reverse map can probably be considered a legitimate host and be
accepted right away. 

>  > > Maybe some major router vendor (whoever THAT might be) needs to put in
>  > > code that recognizes an abnormally large number of SYN packets, and
>  > > sends a new ICMP packet to the destination IP address, saying
>  > > "excessive SYNs seen".
>  > 
>  > I have an even better idea - rather than rely on the vendors, let's put it
>  > in the Linux IP code.  (I do agree with you that the vendors SHOULD do
>  > that, but I don't really think they're going to)
> 
> Linux is not used as a router by too many people.

It is, however, used as a web/mail/FTP/news/etc. server by a large and 
growing number of ISP's.  The SYN flood doesn't affect the router 
adversely anyway (other than sending a bunch of packets across it); it 
affects the machine on which those services are running.

Like I said, I agree that major vendors SHOULD put code into their 
routers to deny this type of attack.  But I'm going to be pragmatic and 
assume they aren't going to anytime soon.  In the meantime, since this 
could be implemented on Linux, why not do it and see if it solves any 
problems?  I don't know the kernel code that well, but I'll lend whatever 
help I can if anyone else is interested.

shag

Judd Bourgeois      | When we are planning for posterity,
shagboy@bluesky.net | we ought to remember that virtue is
Finger for PGP key  | not hereditary.        Thomas Paine



home help back first fref pref prev next nref lref last post