[4501] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New Denial of Service Attack on Panix:

daemon@ATHENA.MIT.EDU (Avi Freedman)
Tue Sep 17 16:39:48 1996

From: Avi Freedman <freedman@netaxs.com>
To: avg@quake.net (Vadim Antonov)
Date: Tue, 17 Sep 1996 16:31:11 -0400 (EDT)
Cc: forrestc@iMach.com, nanog@merit.edu, iepg@iepg.org
In-Reply-To: <199609172002.NAA01245@quest.quake.net> from "Vadim Antonov" at Sep 17, 96 01:02:04 pm

> This is the excellent idea!  Actually, router vendors may simply
> add a feature which shuts down the interface if SYN/SYN-ACK balance
> is too bad -- thus disconnecting the hacker-to-be.
> 
> Of course, that balance may be decaying with time, so repeated
> unsuccessful attempts to connect won't trigger alarms.
> 
> --vadim

Ah, that's fun if it's a XP interface we're talking about :)
Presumably you wouldn't enable that option on one, though...

Avi

> Forrest W. Christian <forrestc@iMach.com> wrote:
> 
> Maybe I'm missing something here, but wouldn't these Denial of Service 
> attacks cause a severe mismatch in the numbers of SYNs and SYN-ACKs on a 
> given router interface?
> 
> If so, then couldn't we just sweet-talk cisco into providing 5 minute 
> counts of syns and syn-acks on an interface?
> 


home help back first fref pref prev next nref lref last post