Date: Sat, 26 Aug 2000 10:33:51 -0600 From: Wes Peters <wes@softweyr.com> To: FengYue <fengyue@bluerose.windmoon.nu> Cc: freebsd-hackers@freebsd.org Subject: Re: SYN flood prevention methods Message-ID: <39A7F16F.3E073F17@softweyr.com> References: <Pine.BSF.4.10.10008260810450.9608-100000@bluerose.windmoon.nu>
next in thread | previous in thread | raw e-mail | index | archive | help
FengYue wrote: > > Hi, I know this is an old topic but I don't seem to find answers > to my questions in the mailing list archives. > > I'm wondering why FreeBSD did not implement the SYN cookies method > that is currently implemented in Linux? To my best understanding, > SYN cookie seems to be a better method against SYS flood than > the random drop method. It seems both OpenBSD and FreeBSD have > implemented the random drop method. I guess there are must be some > "bad things" about SYN cookies that I don't know about. A quick search of the net, hackers, and security mail lists turned up a number of hits for "syn cookie", including several with URL references to weaknesses in the scheme. http://www.FreeBSD.org/cgi/search.cgi?words=syn+cookie&max=50&sort=score&source=freebsd-security&source=freebsd-hackers&source=freebsd-net -- "Where am I, and what am I doing in this handbasket?" Wes Peters Softweyr LLC wes@softweyr.com http://softweyr.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?39A7F16F.3E073F17>