Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 28 Mar 2000 22:15:09 -0600
From:      Troy Kittrell <troyk@basspro.com>
To:        "Daniel O'Callaghan" <danny@FreeBSD.ORG>
Cc:        freebsd-isp@FreeBSD.ORG
Subject:   Re: DoS attacks
Message-ID:  <38E1834D.C42B409C@basspro.com>
References:  <Pine.BSF.4.10.10003291232030.24830-100000@enya.clari.net.au>

next in thread | previous in thread | raw e-mail | index | archive | help
  I've searched high and low for technical reports myself, not only from the
perspective of reacting to an attack of this nature but attempting to prevent
the attack. Results be nada. www.securityfocus.com offers some interesting
downloads of software that scans a system for software that is probably one of
the malicious clients on a DoS attack, but I've yet to find a technical
document that presents a solution that prevents the attack.
  I've also been going through an analysis of our own primary firewall
solution (in hopes of finding a more robust product) and have found that
vendors seem to answer this (DoS) problem with hardware that can handle more
connections than can be "faked" through your bandwidth. It's just my opinion,
but I don't think there is a pre-emptive answer for DoS attacks other than
doing everything you can to make sure that (your) routers are configured to
not to be influenced by outside sources.
  One serious problem I myself have realized is that AOL, with it's wondermous
proxy project, can send so many users to our site at once that, from a single
IP address, for all outward appearances could possibly be an attack. The DoS
attack can't, AFAIK, be specifically identified and blocked. Hence the recent
approach from vendors that I've noticed is to provide maximum over-kill on
(firewalling/load-balancing) devices that can handle the trin00, tribal flood
network, stacheldraht (?sp) or distributed smurf attack. The over-kill is in
that it can handle so many  "hung" socket connections that normal traffic can
still get through. Will it work? Only time will tell...

Daniel O'Callaghan wrote:

> Does anyone know a URL for technical info on the recent DoS on Yahoo! etc.
> The reports I've found all refer to "floods of packets", but don't say
> whether they were TCP SYN or SYN/ACK or what.
>
> GlobalCenter, who look after the Yahoo! facilities managed to do something
> to quell the attack, but it took them a few hours. Anyone know what they
> did?  I use GlobalCenter Melbourne, myself, so I'll ask the techs there if
> they can find out, too.
>
> Can anyone share the steps they have taken to limit the effect of these
> attacks on their own facilities.
>
> Thanks,
>
> Danny
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-isp" in the body of the message



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-isp" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?38E1834D.C42B409C>