[4984] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: New Denial of Service Attack on Panix

daemon@ATHENA.MIT.EDU (Jeff Weisberg)
Thu Oct 3 17:54:42 1996

From: Jeff Weisberg <jaw@Op.Net>
Date: Thu, 3 Oct 1996 17:48:20 -0400
To: nanog@merit.edu
Cc: iepg@iepg.org



Avi writes:
| > But of course. The problem is that SYN_RCVD is a transient state in the
| > TCP automaton, and it requires some resources allocation. The life
| > might have been a little bit different if servers weren't forced
| > to track this state. Something like a signed ticket accompanying the
| > second SYN and the following ACK.
| > 
| > Dima
| 
| That's the idea of making the iss a ticket that includes mss info and
| a hash of the other info plus a security ticket.
| 
| I had hoped to work on that but it looks like someone else local is almost
| done and claims that ignoring window size and any data with the SYN(s)
| is harmless...

"someone else local" :-) has thrown the initial implementation up on
his ftp server; sun3 & sun4 .o's and a back-port to Net/2 src code
(note though, I have not tested the Net/2 port):

	ftp.op.net:/pub/src/syn-prophylactica/

I have been able to withstand a ~600+ syn/sec attack with no 
noticable problems (slightly increased load, but no dropped 
connections). 

	--jeff


home help back first fref pref prev next nref lref last post