[4469] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New Denial of Service Attack on Panix

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Sep 17 10:39:29 1996

To: "Forrest W. Christian" <forrestc@imach.com>
cc: nanog@merit.edu, iepg@iepg.org
In-reply-to: Your message of "Tue, 17 Sep 1996 03:28:23 MDT."
             <Pine.LNX.3.91.960917030857.17180B-100000@IMgate.iMach.com> 
Reply-To: perry@piermont.com
Date: Tue, 17 Sep 1996 10:30:26 -0400
From: "Perry E. Metzger" <perry@piermont.com>


"Forrest W. Christian" writes:
> Maybe I'm missing something here, but wouldn't these Denial of Service 
> attacks cause a severe mismatch in the numbers of SYNs and SYN-ACKs on a 
> given router interface?
[...]
> Then, if the ratio got too high, it can start yelping about "Potential SYN 
> D-O-S Atttack in progress on Interface Serial 1"
> 
> In this manner "good" isp's wouldn't unknowingly carry these attacks.

I think it is easier to just block the attacks completely by source
filtering your own network, at which point you can't carry such an
attack, knowingly or unknowingly.

> I envision this being done on the somewhat bigger isp's where
> putting inbound filters on their customer interfaces would be not a
> good idea (Sprint, MCI, Net 99, etc.).

What you propose is actually much harder to build than filters are.

> Personally, I know that these attacks aren't going to originate at our 
> site, as I have the filters on.   However, I am quite concerned about 
> getting hit with one...

Please help, then, in convincing people that it is important to turn
on filtering on all leaf networks.

Perry

home help back first fref pref prev next nref lref last post