Re: An Analysis of the DHEat DoS Against SSH in Cloud Environments

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Mon, 24 Jun 2024, Chris Rapier wrote:

> On 6/19/24 4:11 PM, Joseph S. Testa II wrote:
> > On Wed, 2024-06-19 at 09:19 -0400, chris wrote:
> > > real world example (current snapshot of portable on linux v. dheater)
> > 
> > Thanks for this.  However, much more extensive testing would be needed
> > to show it is a complete solution.  In my original research article, I
> > used CPU idle time as the main metric.  Also, I showed that very low-
> > latency network links could bypass the existing countermeasures.
> > 
> > I suppose in the next few days, I'll try reproducing my original steps
> > with the new version and see what happens.
> 
> You may want to try this on IPv6 where you are frequently changing the
> attackers MAC address. If the IP is constructed with EUI-64 then it could
> start to flood the table used to store the penalized IPs. I'd really like to
> see what that looks like, especially in terms of CPU/memory utilization.

it will look like a successful DoS, unless/until we change the default
PerSourcePenalties overflow6 mode and or the default IPv6
PerSourceNetBlockSize. IMO the latter is the more likely path.

-d
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux