[4433] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New Denial of Service Attack on Panix

daemon@ATHENA.MIT.EDU (Avi Freedman)
Mon Sep 16 22:12:15 1996

From: Avi Freedman <freedman@netaxs.com>
To: perry@piermont.com
Date: Mon, 16 Sep 1996 22:07:07 -0400 (EDT)
Cc: michael@memra.com, nanog@merit.edu, iepg@iepg.org
In-Reply-To: <199609170149.VAA24445@jekyll.piermont.com> from "Perry E. Metzger" at Sep 16, 96 09:49:03 pm

> Michael Dillon writes:
> > There are at least three things you can do to protect yourself from such
> > attacks. One is to patch your UNIX/BSD kernel to allow much higher numbers
> > of incomplete socket connections.
> 
> Also, hashing the incoming PCBs is a big win.

Or not even creating PCBs and socket structures for the un-acknowledged
SYNs.  Keep them in a data structure that stores the pertinent info and
reconstruct the packets when the ack comes in (when you create the mbufs/
PCB/socket).

> That breaks TCP, and often badly. In fact, the problem isn't so bad
> with a properly designed kernel. The initial experiments say that
> increasing the size of the incoming connection queue, hashing the
> queue, and adaptively lowering the timeout on infant connections
> should permit you to survive pretty intense attack without stopping
> service. This is probably the best approach for people to unilaterally
> take.

Here here.

> However, in general, it would be very nice for providers to start
> filtering their customers so that they could not send forged packets
> from network numbers they don't own.

Here here here.

> Perry

Avi


home help back first fref pref prev next nref lref last post