Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 20 Jul 2001 03:19:41 +0200
From:      Walter Hop <walter@binity.com>
To:        Robert Hough <rch@acidpit.org>
Cc:        freebsd-isp@freebsd.org
Subject:   Re[2]: What do you do about DoS attacks?
Message-ID:  <11067807702.20010720031941@binity.com>
In-Reply-To: <20010719084853.A98826@acidpit.org>
References:  <17810514298.20010719112448@binity.com> <20010719084853.A98826@acidpit.org>

next in thread | previous in thread | raw e-mail | index | archive | help

[in reply to rch@acidpit.org, 19-07-2001]

Thank you for your good reply to my post :)

I have been able to capture some of the malicious traffic:

01:25:10.885919 205.114.189.220.1028 > 213.239.135.226.80: S 4284658201:4284658201(0) win 16384 <mss 1460,nop,[bad opt]> (DF)
01:25:10.885929 24.248.173.190.1058 > 213.239.135.226.80: S 926436216:926436216(0) win 16384 <mss 1460,nop,[bad opt]> (DF)
01:25:10.885936 205.191.138.167.1111 > 213.239.135.226.80: S 1070972984:1070972984(0) win 16384 <mss 1460,nop,[bad opt]> (DF)

The packets all have a bad TCP header option in common. A quick dump of
normal traffic shows no sign of these packets and I can't think of a
legitimate use for these packets. So, now I only have to convince my
upstream provider that these packets need to be dropped -- I hope that
Juniper routers have a means for this. The upstream can't be arsed to
devote much time to this issue, so I'll have to give them clear
instructions on how to do this... Ah well, that's a project for
tomorrow.

Thanks anyway. :)
walter

--
 Walter Hop <walter@binity.com> | +31 6 24290808 | Finger for public key


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-isp" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?11067807702.20010720031941>