[4944] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New Denial of Service Attack on Panix\

daemon@ATHENA.MIT.EDU (Avi Freedman)
Thu Oct 3 02:49:45 1996

From: Avi Freedman <freedman@netaxs.com>
To: bass@cactus.silkroad.com (Tim Bass)
Date: Thu, 3 Oct 1996 02:46:37 -0400 (EDT)
Cc: nanog@merit.edu, iepg@iepg.org
In-Reply-To: <199610030453.AAA00268@cactus.silkroad.com> from "Tim Bass" at Oct 3, 96 00:53:59 am

> The draft BCP that people are working on is OK.
> 
> However,  much of what I have seen today in my lab, might
> be better off discussed in private... I'll say, as most
> of you know, SR filtering is useful, but it cannot
> stop the attacks. 
> 
> Kernel Protection and Recovery Tools are Critical
> and Needed in a Hurry.
> 
> Right now, I could use a 'simple command line flush
> the queue, close all sockets, release all descriptors'
> tool.

Comment out the line in /etc/inetd.conf; kill -1 the inetd proc;
stop any processes listing on those ports; comment it back in; 
kill -1 inetd again.  If you want to command-line it, move a file with 
the commented line in and out of /etc/inetd.conf's place.

When there's nothing listening on those ports all the sockets, descriptors,
queues, pcbs, etc... go away.

Is this not what you were thinking of?

> If anyone has such a critter, it is one more brick
> in the wall.
> 
> Please let me know. via e-mail, thanks.
> 
> Regards,
> 
> Tim

Avi


home help back first fref pref prev next nref lref last post