[4195] in linux-net channel archive

home help back first fref pref prev next nref lref last post

Re: SYN floods

daemon@ATHENA.MIT.EDU (Martin Mares)
Tue Aug 27 04:24:25 1996

From: Martin Mares <mj@k332.feld.cvut.cz>
To: shagboy@bluesky.net
Date: 	Tue, 27 Aug 1996 10:08:28 +0200 (MET DST)
Cc: linux-net@vger.rutgers.edu
In-Reply-To: <Pine.LNX.3.91.960827000848.2057F-100000@cirrus.bluesky.net> from "Racer X" at Aug 27, 96 00:12:06 am

Hi,

> Do it the same way ipfwadm does it.  Allow there to be specific rules 
> concerning what's allowed from where, and time restrictions (for 
> instance, no more than 10 connects in 5 seconds or 20 in 1 minute from 
> any one host).  The only changes needed in the kernel are the hooks to 
> set these parameters (and of course, to check them).

   It doesn't solve the problem -- you can simply circumvent these
host-based restrictions by using _random_ source addresses for the attack.

							Martin

home help back first fref pref prev next nref lref last post