[4552] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: SYN floods

daemon@ATHENA.MIT.EDU (Paul Ferguson)
Wed Sep 18 08:07:15 1996

Date: Wed, 18 Sep 1996 07:52:12 -0400
To: "Erik E. Fair" (Time Keeper) <fair@clock.org>
From: Paul Ferguson <pferguso@cisco.com>
Cc: "Kent W. England" <kwe@6SigmaNets.com>, Michael Dillon <michael@memra.com>,
        nanog@merit.edu, iepg@iepg.org

At 02:36 PM 9/17/96 -0700, Time Keeper wrote:

>It is also important to remember that the SYN attack is only one in a class
>of one-way denial-of-service attacks. While hardening the servers on the
>net against this kind of attack is important (and is the province of the
>server/OS vendors, not the router or firewall vendors), the most effective
>way to end a denial of service attack is to trace it to its source, and
>terminate it there.
>

And terminate the perpetrator. ,-)

>
>It is time for a Best Common Practice document.
>
>	Erik Fair
>

Erik, I volunteer to co-author. Please contact me if you are interseted
in getting this document put together RSN.

- paul


home help back first fref pref prev next nref lref last post