syn DDoS attack solution

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




 Hi all,


We recently got under a low traffic botnet DDoS attack. All attacker nodes opened a single tcp session (just SYN part) and then did nothing. This rules out rate limiting solutions and syncookie doesn't help either. (Thousands of attacking nodes).


I'd like to know you thoughts about two possible approaches in solving this:

- syn proxy: already used for example by Cisco. The router handles the first part of the connection and only routes packets to the client if the connection seems good. (Good against single/spoofed incoming SYNs but may be used to wait for the first packet with actual data as well). - Implement a conntrack solution that gives a timestamp to the connection. Then this timestamp could be used to drop the connection if no data arrives within a configured time limit (good for open inactive connections only). Of course appropriate close toward the local client has to be done as well.

What's your opinion?

Bye
Bgs


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux