Folks,

I've been officially monitoring some TCP traffic on a network and I'm
having difficulty understanding some of the traffic sequences.


1.
  HOST A----> TCP SYN ----> HOST B
  HOST A----> TCP SYN ----> HOST B
  HOST A----> TCP SYN ----> HOST B
  HOST A----> TCP SYN ----> HOST B
 

(No TCP back in the other direction).


2. 
HOST A----> TCP SYN ----> HOST B
HOST A<---  SYN_ACK <---- HOST B

HOST A----> TCP SYN ----> HOST B
HOST A<---  SYN_ACK <---- HOST B

HOST A----> TCP SYN ----> HOST B
HOST A<---  SYN_ACK <---- HOST B

HOST A----> TCP SYN ----> HOST B
HOST A<---  SYN_ACK <---- HOST B

( No ACK after the original SYN - even though the SYN_ACK is sent).


Is case 1. where an unauthorised host is trying to access an IP past a
Firewall ? (i.e. does a firewall work by simply IGNORING SYNS from 
unauthorised hosts)

Is case 2. a valid recording of an IP Spoofing attack ? - where HOST A
is in fact causing HOST B to fill up its SYN-RCVD queue thus gagging it
- or is there another valid not so sinister reason?

Is there a good URL which shows valid/invalid TCP flow sequences ?


Thanks for your help!



-- 
Al Milne
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]

Reply via email to