Date: Tue, 18 Jan 2000 22:30:30 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: Wes Peters <wes@softweyr.com> Cc: patl@phoenix.volant.org, David Wolfskill <dhw@whistle.com>, matt@ARPA.MAIL.NET, freebsd-security@FreeBSD.ORG Subject: Re: TCP/IP Message-ID: <200001190630.WAA33466@apollo.backplane.com> References: <ML-3.4.948228615.4905.patl@asimov.phoenix.volant.org> <388557FB.443E66B0@softweyr.com>
next in thread | previous in thread | raw e-mail | index | archive | help
:> > Put another router in series with it. Use an RFC 1918 "private net"
:> > numbering scheme for that (pathological) network, which then becomes an
:> > effective "demarc" between uunet.ca's responsibility/ability and yours.
:> >
:> > This generalizes, within reason. (Yes, it adds latency, too....)
:>
:> Umm, I think Matt's point was that he would like to filter these
:> things out -before- they consume bandwidth between his uplink and
:> his router. (I know I would...)
:
:Get a better ISP. They should provide such services, and the good ones will.
:They may charge to set it up, but they aren't going to want SYN floods on
:their networks. If the flood is coming from within your ISP, talk to the ISP
:and get the plug pulled on the flood source.
:
:--
: "Where am I, and what am I doing in this handbasket?"
:
:Wes Peters Softweyr LLC
Blocking SYN floods with spoofed source IP addresses is virtually
impossible. Not only can one not tell the difference between a spoofed
packet and a real SYN, it is also virtually impossible to determine
whether the actual source of the packets is if the source is not coming
from another customer in the same ISP.
A BEST customer was once attacked with a SYN flood all night long. It
took us less then a minute to determine that the flood was coming in
over our MCI transit. MCI had all night to locate the source (the attack
lasted for several hours) and never could. They couldn't pick the attack
out from the many gigabits they were shoving around with the debugging
tools they had. There wasn't anything we could do about it.
The only way to deal with SYN floods is to force leaf nodes (e.g. ISPs,
colleges) to source-ip-filter their outgoing links to prevent people from
spoofing packets within their networks using source IP's that are outside
their networks, or to force large backbones to filter the leaf nodes
themselves to allow only properly sourced packets through. Good luck!
All the major backbones have known about the problem for years and
haven't done a damn thing about it.
-Matt
Matthew Dillon
<dillon@backplane.com>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001190630.WAA33466>
