[4193] in linux-net channel archive

home help back first fref pref prev next nref lref last post

Re: SYN floods

daemon@ATHENA.MIT.EDU (Racer X)
Tue Aug 27 01:51:26 1996

Date: 	Tue, 27 Aug 1996 00:12:06 -0400 (EDT)
From: Racer X <shagboy@wspice.com>
Reply-To: shagboy@bluesky.net
To: Eric Schenk <schenk@cs.toronto.edu>
cc: linux-net@vger.rutgers.edu
In-Reply-To: <96Aug25.133627edt.15387@dvp.cs.toronto.edu>

On Sun, 25 Aug 1996, Eric Schenk wrote:

> Also, I'm not sure I'd want to see such heuristics as part of the kernel.
> If we can figure out a way to deal with this in user space, then it
> may be worth a try.

Do it the same way ipfwadm does it.  Allow there to be specific rules 
concerning what's allowed from where, and time restrictions (for 
instance, no more than 10 connects in 5 seconds or 20 in 1 minute from 
any one host).  The only changes needed in the kernel are the hooks to 
set these parameters (and of course, to check them).

> In the end, I don't see how Denial of Service attacks can be prevented.
> All we can hope to do is to make the attacker tracable so they can be
> held accountable. IPV6 should help with this somewhat.

This is a possible solution, at least for now.  It's something everyone 
can do on their own, and not have to worry about someone higher up 
protecting them.  I think we can at least do SOMETHING for now about 
denial of service type attacks.

shag

Judd Bourgeois      | When we are planning for posterity,
shagboy@bluesky.net | we ought to remember that virtue is
Finger for PGP key  | not hereditary.        Thomas Paine



home help back first fref pref prev next nref lref last post