[4973] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP SYN attacks

daemon@ATHENA.MIT.EDU (Avi Freedman)
Thu Oct 3 15:48:26 1996

From: Avi Freedman <freedman@netaxs.com>
To: zab@grumblesmurf.net (Zach)
Date: Thu, 3 Oct 1996 15:40:19 -0400 (EDT)
Cc: rja@cisco.com, nanog@merit.edu, iepg@iepg.org
In-Reply-To: <Pine.LNX.3.92.961003121732.153h-100000@brownz.rhn.orst.edu> from "Zach" at Oct 3, 96 12:20:15 pm

> On Thu, 3 Oct 1996, Ran Atkinson wrote:
> 
> > >Dima Volodin writes:
> > >> Now can I hold my breath waiting for vendors to incorporate this stuff
> > >> into their products?
> >
> > At least BSDI, Sun, SGI, and HP are working on TCP SYN hardening.
> > (yes, cisco is also on top of things :-).
> >
> > I have no data on what might be up at other vendors.
> 
> the linux ip folk have released at least one patch (available near
> http://www.uk.linux.org/NetNews.html) that holds off the problem for a
> bit.  it has a larger infant connection queue and drops some off the end
> if its under attack.  There has also been some talk of doing much more
> 'sneaky' stuff.  i.e. encoding cookies in rsts instead of sending
> synacks..

Yes.  This is the approach I like.
Store the mss info either in toto or in a table of "mss values I have
seen" as some # of bits of the iss and the rest is a one-way hard-to-guess
hash of some sort of the rest of the data (a rotating secret #, src/dest ips 
and ports etc...);

> zach

Avi


home help back first fref pref prev next nref lref last post