[4401] in linux-net channel archive

home help back first fref pref prev next nref lref last post

Re: SYN spoofing attacks

daemon@ATHENA.MIT.EDU (Michael Callahan)
Sun Sep 15 20:22:05 1996

Date: 	Sun, 15 Sep 1996 18:21:13 -0400 (EDT)
From: Michael Callahan <mjc@emmy.smith.edu>
Reply-To: Michael Callahan <mjc@emmy.smith.edu>
To: Alan Cox <alan@lxorguk.ukuu.org.uk>
Cc: linux-net@vger.rutgers.edu, jos@xos.nl
In-Reply-To: <m0v2Gr8-0005FbC@lightning.swansea.linux.org.uk>

On Sun, 15 Sep 1996, Alan Cox wrote:

> One more idea to throw into the can for bigger sites would be to look
> at modifying the masquerading code so a front end box can sit and
> wait for SYN SYN|ACK ACK transitions then pass the connection request through
> to the real host and bend the sequence numbers. That way you can have one
> box with a lot of ram that does nothing but hold connections and expire
> them appropriately. Such a box could if designed right also shield other
> non Linux systems.

Another option I've been thinking about would be to move management of TCP
SYNRCVD sockets into a user-level process for reasons similar to the
user-level ARP daemon.  I think that ultimately this would be more
satisfactory than a solution that still required kernel state for SYNRCVD
sockets.

Michael



home help back first fref pref prev next nref lref last post