Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Sep 1996 13:36:38 PDT
From:      Bill Fenner <fenner@parc.xerox.com>
To:        guido@gvr.win.tue.nl (Guido van Rooij)
Cc:        apg@demos.net (Paul Antonov), hackers@freebsd.org
Subject:   Re: patch against SYN floods (RED impl.) 
Message-ID:  <96Sep27.133646pdt.177476@crevenia.parc.xerox.com>
In-Reply-To: Your message of "Fri, 27 Sep 96 12:37:52 PDT." <199609271937.VAA02005@gvr.win.tue.nl> 

next in thread | previous in thread | raw e-mail | index | archive | help

In message <199609271937.VAA02005@gvr.win.tue.nl> you write:
>Seeing your patch: isn't it much quicker to walk down the so_q0 list and
>get the pcb's from there?

Not only that, but it's relatively dangerous to use information supplied
by the attacker as part of your "random" number.  For example, the attacker
could vary his initial sequence number by tv_usec / 33 and keep the
"random" number constant.

The "oldest-drop" code in -current works well for moderate attack rates;
a "random-drop" mode works better for a heavy attack.  The best thing
would be an automatic switch based upon the rate of queue drops.

  Bill



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?96Sep27.133646pdt.177476>