Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jul 2017 14:57:45 -0400
From:      Matt Riffle <matt@pair.com>
To:        freebsd-security@freebsd.org
Subject:   ACK Storm protection?
Message-ID:  <8F4BB6E0-66A3-4367-BD86-DC29F2BA3C0A@pair.com>

next in thread | raw e-mail | index | archive | help
Hello,

Starting on July 11, I=E2=80=99ve started to see an increasing number of =
what appear to be =E2=80=9CACK storms=E2=80=9D affecting a number of =
FreeBSD boxes I=E2=80=99m administering.  There are a few unsupported =
releases mixed in, but, this is also happening on boxes running =
10.3-RELEASE-p3.

In the cases we=E2=80=99re seeing, it begins with legitimate TCP traffic =
requesting something over HTTP, but soon thereafter we get an out of =
window packet and get in to a loop.  If anybody is interested or =
especially if they=E2=80=99ve experienced something similar, there are a =
few more details I could share privately.

Setting aside the cause, I=E2=80=99m interested in trying to mitigate =
the problem.  None of my Ubuntu boxes appear to be affected, I presume =
because of these patches Google made to the kernel there:

https://www.ietf.org/mail-archive/web/tcpm/current/msg09445.html =
<https://www.ietf.org/mail-archive/web/tcpm/current/msg09445.html>;

Is there any equivalent protection for FreeBSD?  In my own research =
I=E2=80=99ve been unable to find anything.  In fact, beyond the message =
above you can=E2=80=99t find very much about ACK storms at all.

Right now we=E2=80=99re mitigating with custom code that is sniffing =
packets and adding temporary firewall rules whenever it sees a loop =
start, and that=E2=80=99s working well enough, but, I=E2=80=99d prefer =
to handle it at a lower level if possible.

Thanks,

Matt R.







Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8F4BB6E0-66A3-4367-BD86-DC29F2BA3C0A>