>It seems that the IMAIL 6.06 Web Messaging Server is susceptible to a SYN
>attack.
>I would be interested in hearing if IMAIL 7.0x is susceptible...

It's your server that is susceptible, not IMail.  IMail has no control over 
this.

The TCP/IP stack is responsible for allowing a certain number of "half 
open" connections (the SYN is sent by a computer that wants to connect by 
TCP/IP, your computer responds with a SYN+ACK saying "OK, you can connect; 
please acknowledge", and the remote computer responds back with an ACK 
saying "OK, the connection is complete.").  If a remote computer sends 
multiple SYN's without acknowledging them, they will stay "half open" on 
your server.  I believe that Windows by default only allows 5 such 
connections (which get freed up after a few minutes).  Once the hacker 
sends 5 of 'em, nobody else can connect until one of them is freed up 
(either until several minutes pass by, or the hacker stops.  Other OS's 
allow more, but it only takes a second or so to send 256 SYNs at 60 bytes a 
piece.

Note that if you have a half decent firewall, it should protect you from 
these attacks.

A historical note:  Panix, the largest ISP in New York at the time, was 
shut down (about 6 years ago) for about a week by hackers doing this.

>For those that don't know what a SYN attack is,  a remote node
>initiates a TCP/IP conversation by sending a SYN packet....

Whoops, sorry, I didn't mean to repeat you.  That's what I get for not 
reading ahead.  But the key point is that IMail has no way to control this, 
it's (almost) 100% an OS issue.

                                                    -Scott
---
Declude: Anti-virus, Anti-spam and Anti-hijacking solutions for 
IMail.  http://www.declude.com

---
[This E-mail was scanned for viruses by Declude Virus (http://www.declude.com)]


Please visit http://www.ipswitch.com/support/mailing-lists.html 
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/

Reply via email to