[12934] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Syn flooding attacks

daemon@ATHENA.MIT.EDU (Vern Paxson)
Mon Oct 20 14:32:27 1997

To: Phil Howard <phil@charon.milepost.com>
Cc: paulo@br.global-one.net (Paulo Maffei), nanog@merit.edu
In-reply-to: Your message of Mon, 20 Oct 1997 12:09:11 PDT.
Date: Mon, 20 Oct 1997 11:08:27 PDT
From: Vern Paxson <vern@ee.lbl.gov>

> The router could discard the SYN, remembering it, and let pass the retry SYN
> that usually occurs with valid connections and does not with invalid ones.

This is no good - all the crackers have to do is modify their programs
to send two bogus SYNs, spaced apart, instead of just one.

		Vern

home help back first fref pref prev next nref lref last post