[5002] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP SYN attacks

daemon@ATHENA.MIT.EDU (Avi Freedman)
Thu Oct 3 21:00:15 1996

From: Avi Freedman <freedman@netaxs.com>
To: tep@sdsc.edu (Tom Perrine)
Date: Thu, 3 Oct 1996 20:50:51 -0400 (EDT)
Cc: dvv@sprint.net, richards@netrex.com, rja@cisco.com, nanog@merit.edu,
        iepg@iepg.org
In-Reply-To: <9610032113.AA23170@galt.sdsc.edu> from "Tom Perrine" at Oct 3, 96 02:13:26 pm

> I agree.
> 
> It seems to me that placing this processing in the firewall is
> *potentially* dangerous, as now a SYN-flooding attack (*IF*
> *successful*) will deny service to everything behind the firewall,
> instead of just the targeted host.
> 
> If I know I can fire-hose your firewall, and take your *site* off the
> net, then it might become more attractive to me to "find" sufficient
> CPU and bandwidth resources to generate enough packets to take you
> out.  This could "raise the stakes" enough to make it worth it to an
> attacker.

If someone can hose a firewall with an adaptive SYN timeout and
a 100,000 or more-entry state storage structure for pending SYNs
(not that any particular implementation does this that I know of 
or don't know of) then I *WANT* them to attack me.

Something that un-subtle should be eeasy to track back to the source.

> Tom E. Perrine (tep@SDSC.EDU) | San Diego Supercomputer Center 
> http://www.sdsc.edu/~tep/     | Voice: +1.619.534.5000
> "Ille Albus Canne Vinco Homines" - You Know Who

Avi

home help back first fref pref prev next nref lref last post