[4582] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: syn attack and source routing

daemon@ATHENA.MIT.EDU (Vadim Antonov)
Wed Sep 18 17:23:05 1996

Date: Wed, 18 Sep 1996 14:07:55 -0700
From: Vadim Antonov <avg@quake.net>
To: bwatson@genuity.net, jhawk@bbnplanet.com
Cc: curtis@ans.net, nanog@merit.edu

John Hawkinson <jhawk@bbnplanet.com> wrote:

>   i should have been more specific.  i don't like the idea (at all) of
> breaking traceroute -g either.  i guess in a more general sense i
> should ask "just how dangerous *is* having backbone-wide/internet-wide
> loose source routing enabled?".

>As Curtis explained, "not very".

Want to wait until SYN attacks are augmented with LSRR-enabled
traffic randomization to the point of making it nearly impossible
to trace?

People knew about SYN flooding for years.  Nothing happened until
s*t hit the fan.  I strongly suspect that LSRR is of the same
category.

>This is a very different case from that of SYN flooding, where the
>victims are powerless to stop it.

Now, providers being unable to trace would be a nice addition.

>Please don't take our LSRR away from us, it is very useful.

Per se, LSRR is not useful.  traceroute -g is.

Why not to implement something saner like traceroute servers?

Or better yet, the ICMP TRACEROUTE message, which would go
hop by hop and on every hop generates a response message.
Augmented with PROXY TRACEROUTE which will cause the destination
box to send out the ICMP TRACEROUTE.

I can write RFC in my copious spare time if you think that this
makes more sense than the UDP kludge.

>Campaigning to remove something just because you suspect it might be
>bad is really not nice -- it will result in random clueless people
>believeing you when perchance they should not :-)

Ah. I love the "the moozhik won't cross until thunder rolls" attitude.

--vadim

home help back first fref pref prev next nref lref last post