[12895] in bugtraq

home help back first fref pref prev next nref lref last post

Re: FTP denial of service attack

daemon@ATHENA.MIT.EDU (Theo de Raadt)
Wed Dec 8 23:50:31 1999

Message-Id:  <199912080541.WAA07911@cvs.openbsd.org>
Date:         Tue, 7 Dec 1999 22:41:45 -0700
Reply-To: Theo de Raadt <deraadt@CVS.OPENBSD.ORG>
From: Theo de Raadt <deraadt@CVS.OPENBSD.ORG>
X-To:         Darren Reed <avalon@COOMBS.ANU.EDU.AU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  Your message of "Tue, 07 Dec 1999 23:29:56 +1100." 
              <199912071229.XAA13996@cairo.anu.edu.au>

> I don't know of any ftp clients which make use of this feature (multiple
> data channels supported concurrently) as the original ftp clients were all
> line-based and only suported one transfer at a time.  Maybe this is
> reasonable, but it would be a shame for the default defense to this attack
> to mean you can't use FTP to it's full potential (i.e. start a transfer
> from the current session but keep using the current `login' session, maybe
> to start other transfers, as requried).  Triming the number of concurrent
> data sessions to a maximum of 1-5 (by default) would probably be enough,
> with the capability to set this higher/lower as required.

The OpenBSD ftpd has never permitted more than 1 connection at a time
in PASV mode, thus this particular denial of service attack does not
work.

I caused myself some difficulties by accidentally starting up 400 perl
instances, though..

One of the Linux's out there also ships with our ftpd, so they will
not have a problem with this either.  It's either Debian or Suse...

home help back first fref pref prev next nref lref last post