[4378] in linux-net channel archive

home help back first fref pref prev next nref lref last post

(fwd) BoS: Tool for stopping SYN floods

daemon@ATHENA.MIT.EDU (Olaf Titz)
Sat Sep 14 13:12:21 1996

To: submit-linux-dev-net@ratatosk.yggdrasil.com
From: Olaf Titz <olaf@bigred.inka.de>
Date: 	14 Sep 1996 12:19:17 +0200

The solution prevented below looks very simple, could this be a
possible way out of the problem?

> Christopher Klaus <cklaus@iss.net> said:
> 
> [Below we have a software tool that will recognize SYN floods and correct
> the problem.]
> 
> Possible solution to SYN Flooding attacks
> 
> The attack is on!  Both 2600 and Phrack, 2 of the biggest well-known
> underground hacking magazines, have posted exploit code to do one of the
> nastiest denial of service attacks that the Internet has seen so far. 
> Hundreds of people have access to these programs to bring down services on
> the Internet.  Many of these people are targeting their attacks at various
> organizations such as ISP.  Panix, an ISP, has been under attack for quite
> a few days now and they have not been able to receive email. Many other
> ISPs are suffering from the SYN flood attack.  This attack is being
> discussed on many mailing lists, newsgroups, and Thursday's Wall Street
> Journal (9/12/96).  Fortunately a solution already exists as we discuss
> below.
> 
> Everyone connected to the Internet relies on TCP/IP.  When you establish a
> connection with TCP, you do a 3-way handshake.  The connecting host sends
> a SYN packet to the receiving host.  The receiving host sends a SYN|ACK
> packet back and to fully establish a connection, the connecting host
> finally responds with an ACK packet. 
> 
> In a SYN flood attack, an attacker host sends many SYN packets and does
> not respond with an ACK to the SYN|ACK's.  As the receiving host is
> waiting for more and more ACK's, the buffer queue will fill up and the
> receiving machine can no longer accepts legitimate connections. This means
> that attackers can block your email, web, or any other service you are
> providing on the Internet. 
> 
> To even make this attack worse, the code exploiting the problem randomizes
> the source address of the attacking host.  Thus, the receiving machine
> gets packets that appear to be from all over the Internet, hiding the
> location of the attacker. 
> 
> Solution
> 
> There are several things we can do to stop these attacks from being
> effective. 
> 
> With the routers for most ISP, they should be blocking any non-internal
> addresses from leaving their network and going to the Internet. This will
> stop an attacker if their ISP implements this.  Unfortunately, this does
> not stop an attack from areas on the Internet that do not block that. But
> at least the ISP can feel comfortable to know that an attacker can not
> launch his attack from that ISP. 
> 
> Here are two methods of helping eliminate the problem.  Some of the
> exploit code I have seen does not pick a random source port.  It would be
> easy to block the attack with a router denying any packets coming from a
> specific source port. This may not be too effective because of the trivial
> nature of adding code to randomize the source port, sequence number,
> source address, and TTL.  But it might help you temporarily if you notice
> the attacks have any pattern that can be blocked by router rules. 
> 
> Another way to fix this is to set the kernel maximum number of half open
> connections allowed (SO_MAXCONN) to a higher number than the default value.
> We have a tool that will look for SYN packets that do not get followed with
> ACK and clean the half open connections by sending a RST packet.  This 
> unclogs the port and allows legitimate connections to happen.  This tool
> is called RealSecure (tm).  To obtain a copy of the RealSecure tool,
> send email to majordomo@Iss.net and within the body of the message, type: 
> 
>         subscribe realsecure
> 
> RealSecure (tm) is a comprehensive attack recognition and real time response
> tool that ISS is alpha testing and will expire in 60 days.
> 
> --
> Christopher William Klaus Voice: (770)395-0150. Fax: (770)395-1972
> Internet Security Systems, Inc.  "Internet Scanner finds Ste. 660,41
> Perimeter Center East,Atlanta,GA 30346 your network security holes Web:
> http://www.iss.net/ Email: cklaus@iss.net before the hackers do." 
> 
> ========================================================================
> Kenneth L. Hamer <a href=http://www.uiuc.edu/ph/www/k-hamer>WWW Page</a>
> k-hamer@uiuc.edu
> SENILE.COM found . . . Out Of Memory . . .
> 


-- 
___        Olaf.Titz@inka.de or @{stud,informatik}.uni-karlsruhe.de       ____
__ o           <URL:http://www.inka.de/~bigred/>     <IRC:praetorius>
__/<_              >> Just as long as the wheels keep on turning round
_)>(_)______________ I will live for the groove 'til the sun goes down << ____

home help back first fref pref prev next nref lref last post