[21828] in bugtraq

home help back first fref pref prev next nref lref last post

Re: FIN_WAIT_1 DoS (netkill): Why the vulnerability still exists?

daemon@ATHENA.MIT.EDU (stanislav shalunov)
Tue Jul 24 15:57:56 2001

To: Manas Garg <mls@chakpak.net>
Cc: bugtraq@securityfocus.com
From: stanislav shalunov <shalunov@internet2.edu>
Date: 24 Jul 2001 15:05:10 -0400
In-Reply-To: <20010724204807.A432@cygsoft.com>
Message-ID: <87d76qywpl.fsf@cain.internet2.edu>

Manas Garg <mls@chakpak.net> writes:

> Stanislav Shalunov has described it fairly well and following is one
> of the locations where what he wrote can be found:
> http://security-archive.merton.ox.ac.uk/bugtraq-200004/0156.html

This particular archive HTMLizes messages, so it may be inconvenient
to get the code out of there.  See
http://www.internet2.edu/~shalunov/netkill/

> Solaris (2.8): Well, it silently discarded the old connections to keep the
>                number of connections to 450 (approximately). Didn't check the
>                RAM and swap on this machine but what matters is that it was
>                taking some action to avoid a FIN_WAIT_1 DoS attack.

Solaris 2.8 doing something a good news.  However, I don't believe
that throwing away the oldest connections is the best strategy here
(I'd rather throw away random connections, with preference to those
that eat a lot of buffer space).

> 2. Is there a particular reason that this vulnerability still exists
> in these Opearting Systems?

Well, it isn't very obvious what to do about it.  And breaking the
standard is undesirable.  Soemthing has to be done about the spec.  Ad
hoc solutions, different for each OS, could easily lead to
unpredictable TCP reliability failures.

-- 
Stanislav Shalunov		http://www.internet2.edu/~shalunov/

Sex is the mathematics urge sublimated.                 -- M. C. Reed.

home help back first fref pref prev next nref lref last post