[4215] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: SYN floods (was: does history repeat itself?)

daemon@ATHENA.MIT.EDU (Craig A. Huegen)
Mon Sep 9 12:31:12 1996

Date: Mon, 9 Sep 1996 09:13:32 -0700 (PDT)
From: "Craig A. Huegen" <c-huegen@quad.quadrunner.com>
To: Avi Freedman <freedman@netaxs.com>
cc: bwatson@genuity.net, nanog@merit.edu
In-Reply-To: <199609091426.KAA01318@netaxs.com>

On Mon, 9 Sep 1996, Avi Freedman wrote:

==>
==>I will make time to start running the route aggregator at routes.netaxs.com
==>again; we've been fighting a random-src-address-SYN-attacker for the last
==>week or two.  I may have some comments on THAT for NANOG re: inter-provider
==>cooperation shortly.
==>
==>Avi
==>

A friend of mine gave me a photocopy of a page in the latest 2600
magazine.  It was the source code for a SYN flooder on Linux, with a
description of what it does and a notice on how it can really cause
denial-of-service attacks.

I can't remember if it also supplied the source for the source-spoof
kernel patch or not, but it does mention that you should use the
source-spoof patch to hide your identity.

So, what does this say?  Look for more 13-year-olds causing
denial-of-service attacks for the hell of it.  It seems a lot of the
providers SYN flooders like to attack are the ones which have IRC servers,
but the flooders attack the more traditional services of those providers,
too.

/cah

----
Craig A. Huegen  CCIE                             ||        ||
Network Analyst, IS-Network/Telecom               ||        ||
cisco Systems, Inc., 250 West Tasman Drive       ||||      ||||
San Jose, CA  95134, (408) 526-8104          ..:||||||:..:||||||:..
email: chuegen@cisco.com                    c i s c o  S y s t e m s



home help back first fref pref prev next nref lref last post