Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 26 Aug 2000 10:33:51 -0600
From:      Wes Peters <wes@softweyr.com>
To:        FengYue <fengyue@bluerose.windmoon.nu>
Cc:        freebsd-hackers@freebsd.org
Subject:   Re: SYN flood prevention methods
Message-ID:  <39A7F16F.3E073F17@softweyr.com>
References:  <Pine.BSF.4.10.10008260810450.9608-100000@bluerose.windmoon.nu>

next in thread | previous in thread | raw e-mail | index | archive | help
FengYue wrote:
> 
> Hi, I know this is an old topic but I don't seem to find answers
> to my questions in the mailing list archives.
> 
> I'm wondering why FreeBSD did not implement the SYN cookies method
> that is currently implemented in Linux?  To my best understanding,
> SYN cookie seems to be a better method against SYS flood than
> the random drop method.  It seems both OpenBSD and FreeBSD have
> implemented the random drop method.  I guess there are must be some
> "bad things" about SYN cookies that I don't know about.

A quick search of the net, hackers, and security mail lists turned
up a number of hits for "syn cookie", including several with URL
references to weaknesses in the scheme.

http://www.FreeBSD.org/cgi/search.cgi?words=syn+cookie&max=50&sort=score&source=freebsd-security&source=freebsd-hackers&source=freebsd-net

-- 
            "Where am I, and what am I doing in this handbasket?"

Wes Peters                                                         Softweyr LLC
wes@softweyr.com                                           http://softweyr.com/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?39A7F16F.3E073F17>