[4394] in linux-net channel archive

home help back first fref pref prev next nref lref last post

SYN spoofing attacks

daemon@ATHENA.MIT.EDU (Alan Cox)
Sun Sep 15 11:42:16 1996

Date: 	Sun, 15 Sep 96 14:03 BST
From: alan@lxorguk.ukuu.org.uk (Alan Cox)
To: linux-net@vger.rutgers.edu
Cc: jos@xos.nl


One more idea to throw into the can for bigger sites would be to look
at modifying the masquerading code so a front end box can sit and
wait for SYN SYN|ACK ACK transitions then pass the connection request through
to the real host and bend the sequence numbers. That way you can have one
box with a lot of ram that does nothing but hold connections and expire
them appropriately. Such a box could if designed right also shield other
non Linux systems.

Any thoughts Jos ?

Alan

home help back first fref pref prev next nref lref last post