New Denial of Service Attack ...

Christopher Blizzard blizzard at odin.nyser.net
Wed Sep 25 13:25:37 UTC 1996


In message <199609250552.AA19213 at zen.isi.edu>, postel at ISI.EDU writes:
:----- Begin Included Message -----
:
:Subject: Re: FW: Latest attacks....
:Date: Thu, 19 Sep 1996 08:39:02 +0100
:From: Jon Crowcroft <J.Crowcroft at cs.ucl.ac.uk>
:
:
:Date: Wed, 18 Sep 1996 14:32:14 -0600
:From: vjs at mica.denver.sgi.com (Vernon Schryver)
:Subject: SYN bombing defense
:
:As reported here, in article <vxjiv9hkmcb.fsf_-_ at dominator.eecs.harvard.edu>
:in comp.protocols.tcp-ip, Robert Morris  <rtm at dominator.eecs.harvard.edu> wrot
:e:
:
:>Perhaps TCP's listen queue should use random early drop (RED), a
:>technique used by routers to prevent any one source from monopolizing
:>a queue. See http://www-nrg.ee.lbl.gov/floyd/abstracts.html#FJ93 or
:>rfc1254.
:> ...
:
:I've just hacked IRIX 6.3 to do random-drop when sonewconn() in
:tcp_input.c fails.  It works great!  An IP22 receiving 1200 bogus
:SYN's per second directed to port 23 continues to answer requests
:for new telnet as if nothing is happening.
:

Alan Cox just released a patch vs Linux 2.0.21 that does this.  It works 
quite well.  As best I can tell from the patch and the mail that preceded 
it it attempts to maintain about 30% free in the receive queue.  I've 
been running it for a couple of days and it does quite well defending 
against these attacks.  I've stuck it on my web page.

http://odin.nyser.net/~blizzard/linux/

--Chris

:
:Vernon Schryver,  vjs at sgi.com
:
:------- End of Forwarded Message
:
:----- End Included Message -----
-------------------------------------------------------------------
Christopher Blizzard   | "The truth knocks on the door and you say
blizzard at nysernet.org  | 'Go away.  I'm looking for the truth,' and
NYSERNet, Inc.         | so it goes away."  --Robert Pirsig
-------------------------------------------------------------------





More information about the NANOG mailing list