TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any problems!
----------------------------------------------------------------------------

Mukund!

The following is from one of the developers of the Real Secure network 
engine: 


snip>>>>> 


RealSecure keeps a table of SYN's that have been seen which have not been 
followed by ACK packets traveling in the 
same direction to the same connection. Once a following ACK (presumably the 
ACK that completes the three way handshake, but it can be *ANY* ACK packet 
in the subsequent connection) is seen, the SYN is removed from the "half 
open connections" table. This goes on for all SYN's and ACK's that 
RealSecure sees. 


It also, of course, processes any FIN's or RST's it sees appropriately, so 
for instance if a SYN is seen going to a non-open port, and a RST comes back

off that port, it will not be considered as a half-open connection. 


If, for a given listening port, the number of half open connections in the 
table exceeds a certain number (which is configurable by the user in their 
policy file), RealSecure decides a SYNFlood has occurred. It will then 
(optionally, only if the user has the RSKILL action enabled) send a RST 
packet to the listening host to close the half-open connection on the server

side. This mitigates the effect of the flood. 


As a flood proceeds, the RST packets are sent for every contributing SYN. 
However, to keep from creating a subsidiary flood at the console, actual 
SYNFLOOD events are only generated every "Nth" SYN, N again being 
configurable in the users policy file. 

<<<<end snip 


The address that is seen in the packet is placed in the "SPOOFEDSRC" column 
of the event details. 


This being said, you can expect false positives especially from congested 
web servers and email servers. 


You can work to reduce the false positives by configuring the advanced 
properties for the SynFlood decode in your policy. You would want to 
increase the HighWaterMark, which is the number of half open TCP connections

RS allow to wait in each port's queue and probably the PacketsPerEvent which

is the number of the SynFlood packets before RS sends an alert to the 
console or logs to the DB.  

Optimum values for the advanced properties depends entirely on the
environment.  Increase each value until false positives are reduced to your
satisfaction level.

If you're new to the issforum, it's archived at:
http://archives.neohapsis.com/archives/iss/current/0127.html

Greetings,

==================================
Brian Fitch, IDS Support Engineer
Internet Security Systems, Inc.
Phone - 404-236-2700 / 1-888-447-4861
Email - [EMAIL PROTECTED]
==================================


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, December 06, 2000 8:37 PM
To: [EMAIL PROTECTED]
Subject: Interpreting SYN Flood Alerts in RS



TO UNSUBSCRIBE: email "unsubscribe issforum" in the body of your message to
[EMAIL PROTECTED]  Contact [EMAIL PROTECTED] for help with any
problems!
----------------------------------------------------------------------------

Hi All,

We are getting lots of SYN Flood alerts in the Real Secure Console. 

Source Address:0.0.0.0
Destination Address: <IP Address of Web Server>
Info : SPOOFEDSRC < Valid IP Address not in our range >

1. Can Somebody help in interpreting this alert.
2. What is the optimum value to be set for "High Water Mark" and "Packets
Per Event" in Real Secure. Web server is IIS 4.0 (NT 4.0 SP5).

Thanks in Advance,

Mukund


Chequemail.com - a free web based e-mail service that also pays!!!
http://www.chequemail.com



Reply via email to