[6707] in bugtraq

home help back first fref pref prev next nref lref last post

Re: improved synflood protection & detection

daemon@ATHENA.MIT.EDU (Oliver Friedrichs)
Fri May 8 14:43:53 1998

Date: 	Wed, 6 May 1998 15:01:24 -0600
Reply-To: Oliver Friedrichs <oliver@SECURENETWORKS.COM>
From: Oliver Friedrichs <oliver@SECURENETWORKS.COM>
X-To:         VaX#n8 <vax@LINKDEAD.PARANOIA.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <199805061054.FAA04766@linkdead.paranoia.com>

On Wed, 6 May 1998, VaX#n8 wrote:

> Many if not all of the addresses in the above blocks are unused.
> Affording ingress to TCP packets to which you cannot respond
> seems pointless and a bit temerarious.
> It may be worthwhile to generate list of all address blocks not
> recently routed and construct a filter based on those.
> It may also be useful to log these packets for auditing, so
> you can detect if the status of a block changes.

This really won't work.  It may have worked if every single IP address on
every single registered network were in use and reachable 100% of the
time.  I can pick any random registered network and find addresses on that
network which aren't currently being used, or with hosts that aren't
reachable (behind a firewall).

- Oliver

 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   Secure Networks Incorporated.  Calgary, Alberta, Canada, (403) 262-9211

home help back first fref pref prev next nref lref last post