[27189] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [Re: Which Part(s) Failed in the recent DOS Attacks?]

daemon@ATHENA.MIT.EDU (Toplez Razer)
Wed Feb 9 23:10:34 2000

Message-ID: <20000210040519.16006.qmail@nw177.netaddress.usa.net>
Date:  9 Feb 00 21:05:19 MST
From: Toplez Razer <z28convertible@usa.net>
To: Joe Shaw <jshaw@insync.net>,
	Toplez Razer <z28convertible@usa.net>
Cc: nanog@merit.edu
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable
Errors-To: owner-nanog-outgoing@merit.edu


Joe,
Firewall-1 has the SynDefender and Cisco IOS 12.0 has TCP Intercept for
stopping TCP DOS.  Could these features stop massive TCP DOS attacks?

Thanks,
Audie Onibala

******************************


Joe Shaw <jshaw@insync.net> wrote:


On 9 Feb 2000, Toplez Razer wrote:

> 1. Was it the firewall DOS filter?

With packet based DoS attacks, filters don't matter.  Bandwidth and
saturation are what matters.

> 2. No firewall in Yahoo, EBay, ETrade, etc?

Yes, there are, and no, they wouldn't have helped for the reason
stated above.

> 3. Firewall DOS filter worked, but the links were still clogged with
massive
> ACKs/NACKs?

Not exactly, but fairly close.

--
Joseph W. Shaw - jshaw@insync.net
Computer Security Consultant and Programmer
Free UNIX advocate - "I hack, therefore I am."





____________________________________________________________________
Get free email and a permanent address at http://www.netaddress.com/?N=3D=
1


home help back first fref pref prev next nref lref last post