Hi,

On Jan 20, 2009, at 7:12 PM, Peter Saint-Andre wrote:

Marcus Lundblad wrote:
tis 2009-01-13 klockan 13:28 -0700 skrev Peter Saint-Andre:
Dirk Meyer wrote:
Peter Saint-Andre wrote:
1. authentication attempts per account
2. authentication attempts per IP address
3. connection attempts per account
4. connection attempts per IP address
5. simultaneous connections per account
6. simultaneous connections per account

Currently XEP-0205 says a server could do #1 but the consequences might be a DoS against the legitimate user, so instead it recommends #4 or #6 because the spec assumes that the attacker will come from a different IP address than the one used by the legitimate user. But #4 and #6 don't solve the problem that Waqas mentions (a DoS attack launched by someone
from your same IP address, e.g. from behind the same NAT).
Must people have a NAT at home. If someone inside my home network is
running a DoS on my account, I have bigger problems than my XMPP
account.
Right, that's what I was thinking. :)

OTOH, an ISP could NAT a number of subscriber behind a single IP, which
is the one the XMPP would see.
Wouldn't that be an issue?

Yes, that would. In fact, I've heard of whole countries existing behind
one big NAT.

Hmm.

I don't think the "hmm" is really necessary. Sure, there will be scenarios where some of the rules in the DoS XEP are not adequate.

I don't believe the point of the XEP is to provide a mandatory set of anti-DoS rules. Each server admin should be knowledgeable enough to tweak the rules to his particular needs.

I guess the only recommendation we could make is to server vendors: please implement enable/disable logic for each recommendation, instead of a single Anti-DoS On|/off switch.

Best regards,
--
Pedro Melo
Blog: http://www.simplicidade.org/notes/
XMPP ID: [email protected]
Use XMPP!


Reply via email to