[92181] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: TCP receive window set to 0; DoS or not?

daemon@ATHENA.MIT.EDU (Jim Shankland)
Fri Sep 8 20:57:08 2006

Date: Fri, 8 Sep 2006 17:55:59 -0700
From: Jim Shankland <nanog@shankland.org>
To: Travis Hassloch <travis.hassloch@rackspace.com>
Cc: Richard A Steenbergen <ras@e-gerbil.net>, billn@billn.net,
	nanog@merit.edu
In-Reply-To: <4501E18F.9040502@rackspace.com>
Errors-To: owner-nanog@merit.edu


Travis Hassloch <travis.hassloch@rackspace.com> writes:
> The part where it becomes a DoS is when they tie up all the listeners
> on a socket (e.g. apache), and nothing happens for several minutes until
> their connections time out.  Whether intentional or not, it does have
> a negative effect.

Ah, that makes sense.  I was assuming a deliberate attack, which is
not actually implicit in the term "DoS".  A deliberate denial of
service is not made easier by shrinking the window.  But an implementation
that advertises a 0 window in lieu of sending FIN or RST can certainly
deny service inadvertently by tying up resources that should have been
freed.

Jim Shankland

home help back first fref pref prev next nref lref last post