-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Thu, 31 May 2007, Bgs wrote:
Hi all,
We recently got under a low traffic botnet DDoS attack. All attacker nodes
opened a single tcp session (just SYN part) and then did nothing. This rules
out rate limiting solutions and syncookie doesn't help either. (Thousands of
attacking nodes).
I'd like to know you thoughts about two possible approaches in solving this:
- syn proxy: already used for example by Cisco. The router handles the first
part of the connection and only routes packets to the client if the
connection seems good. (Good against single/spoofed incoming SYNs but may be
used to wait for the first packet with actual data as well).
- Implement a conntrack solution that gives a timestamp to the connection.
Then this timestamp could be used to drop the connection if no data arrives
within a configured time limit (good for open inactive connections only). Of
course appropriate close toward the local client has to be done as well.
What's your opinion?
That you knowledge ot TCP/IP is poor.
Thanks,
Ron DuFresne
- --
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
admin & senior security consultant: sysinfo.com
http://sysinfo.com
Key fingerprint = 9401 4B13 B918 164C 647A E838 B2DF AFCC 94B0 6629
...We waste time looking for the perfect lover
instead of creating the perfect love.
-Tom Robbins <Still Life With Woodpecker>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFGXyiqst+vzJSwZikRAih2AJ0SY0npal/EqdwWK+/4SYOGaXY/uACggRtl
uhPlH5F7JzCJGHf2RgryJT4=
=Y3xX
-----END PGP SIGNATURE-----