Question about ISN regeneration when Stateless SYN cookies are used

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



hi folks,


I had a question about the Stateless SYN
cookie approach to solve the Denial of Service attack.
The linux kernel has implemented this for quite some
time now.

So basically when we get an incoming SYN we send back a
SYN+ACK with the ISN generated as

ISN = f(t) + MD5(Sport,Saddress,Dport,Daddress,secret1)

where
  f(t) is a monotonically increasing function of time
  Secret1 is a boot time generated secret number



However lets assume the SYN+ACk that we sent back got
delayed and the client sends a new SYN request.  And
the server sends back a new SYN+ACK and regenerates the
a new ISN.  Note that we are not preserving any state
so the ISN we sent back the first time cannot be regenerated
again.

In the meantime the client gets the OLD SYN and it accepts
it and the connection goes to established state. A  TCB is
created.

Now when the new SYN+ACK arrives and if the new ISN falls
within the Receive window of the client, then the packet
is wrongly accepted.  How  are we handling this issue ?



Naren

_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp

-
: send the line "unsubscribe linux-net" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Netdev]     [Ethernet Bridging]     [Linux 802.1Q VLAN]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Git]     [Bugtraq]     [Yosemite News and Information]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux PCI]     [Linux Admin]     [Samba]

  Powered by Linux