> Date: Tue, 26 Mar 2002 22:10:44 +0100
> From: Nico Meijer <[EMAIL PROTECTED]>


> I did that a couple of times and it didn't work for me at
> all. I blocked the 'offending' IPs thru ipchains and logged all
> data coming in from those. Hardly what you would call a
> flood. You couldn't flood a 300bps modem with that traffic.

SYN flood != traffic flood

Anyone else been around long enough to remember how Panix was hit
by a SYN flood?  A dialup user nearly shut them down.

No, SYN floods work by flooding the kernel with requests to open
TCP connections, until it just plain runs out.  If someone sends
a 3 kB/s stream of minimally-sized TCP/SYN packets, your machine
will be bombarded by several hundred SYN requests per second.
Multiply that by the timeout period... LOTS of half-open sockets.

I rather like how OpenBSD handles (IIRC) SYN floods.  It simply
uses a RED-like algorithm to replace a half-open socket with the
new attempt.  Pretty slick, IMHO.


Eddy

Brotsman & Dreger, Inc. - EverQuick Internet Division
Phone: +1 (316) 794-8922 Wichita/(Inter)national
Phone: +1 (785) 865-5885 Lawrence
--

Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
From: A Trap <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.  Do NOT
send mail to <[EMAIL PROTECTED]>, or you are likely to be blocked.

_______________________________________________
cobalt-developers mailing list
[EMAIL PROTECTED]
http://list.cobalt.com/mailman/listinfo/cobalt-developers

Reply via email to