[11210] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Simple DOS attack on FW-1

daemon@ATHENA.MIT.EDU (Jeff Roberson)
Sat Jul 31 22:05:09 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.BSI.4.05L.9907301956150.11900-100000@chesapeake.net>
Date:         Fri, 30 Jul 1999 20:06:37 -0400
Reply-To: Jeff Roberson <jroberson@CHESAPEAKE.NET>
From: Jeff Roberson <jroberson@CHESAPEAKE.NET>
X-To:         David Taylor <taylord@INFOSECURE.COM.AU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.3.96.990730085850.3773A-100000@twoup.q-net.net.au>

It seems to me that if they maintain TCP state they could set a
significantly smaller timeout if the connection is not established. So a
timeout of a minute should be set on the initial syn request, and the
larger timeout should only be used after the connection is established.
Also, if they implemented a circular buffer where connections that had
been idle the longest were disconnected in favor of new connections their
scalability might increase some.

Jeff

On Fri, 30 Jul 1999, David Taylor wrote:

> On Thu, 29 Jul 1999, Lance Spitzner wrote:
>
> > When FW-1's state connections table is full, it can no longer
> > accept any more connections (usually between 25,000-35,000
> > connections, depending on your system). You can increase this
> > number by increasing kernel memory for the FW-1 module and
> > hacking ../lib/table.def) However, a port scanner can build
> > that many connections in a manner of minutes.
>

home help back first fref pref prev next nref lref last post