[5054] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP SYN attacks - a simple solution

daemon@ATHENA.MIT.EDU (Tim Bass)
Sun Oct 6 21:59:17 1996

From: Tim Bass <bass@linux.silkroad.com>
To: mo@uu.net (Mike O'Dell)
Date: Sun, 6 Oct 1996 21:07:34 -0400 (EDT)
Cc: rex@cs.su.oz.au, bugtraq@netspace.org, nanog@MERIT.EDU, iepg@iepg.org
In-Reply-To: <QQbkic06171.199610070042@rodan.UU.NET> from "Mike O'Dell" at Oct 6, 96 08:42:37 pm

> best solution known so far is Random Drop of waiting connections

....

Random Drop and Oldest drop do not work against high speed attacks.

I thought it was agreed by all on this list last week that Jeff's
solution to delay data structure initialization until after the
handshake is complete was more reliable than Random Drop and
is proven by Jeff on BSD to work with high speed attacks.

I'm confused on the "Random Drop is best" statement, Mike?  There
are very reliable 'others' who seem to have a better and more
robust solution.

Why the bias toward a solution that does not work but in the
slow case?

Best Regards,

Tim

home help back first fref pref prev next nref lref last post