[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-developers] SYN flooding
- Subject: Re: [cobalt-developers] SYN flooding
- From: "William L. Thomson Jr." <wlt@xxxxxxxxxxxxxxxxxxxx>
- Date: Tue Mar 26 13:11:03 2002
- Organization: Obsidian-Studios Inc.
- List-id: Discussion Forum for developers on Sun Cobalt Networks products <cobalt-developers.list.cobalt.com>
E.B. Dreger wrote:
Okay. It's on by default on your system; not in the kernel
(IIRC), but on your system.
Some where yes. When I have compiled some other kernels recently, there
is a question asking whether or not to turn it on by default.
At the moment the XTR is running the kernel that it came with.
Cisco routers have something called TCP intercept that was
introduced in IOS <I forget the version>. When you receive an
incoming SYN, the router pretends to be the protected host, and
replies with a SYN+ACK. If the connection is successfully built,
the router then passes on a proxied connection to the system in
your network.
If you run your own border router, you can do this. If you're
colo'ed, hopefully your provider will understand and help. If
neither, then it's back to the drawing board.
We used to be colo'ed, but now we have a couple SDSL lines and a pair of
Netopia routers. I have been considering getting a Cisco PIX or
something to inspect packets and etc. that could most likely assist in
this situation. I will have to look into that. At the moment due to the
limited space on the Netopia routers I am blocking them out from the XTR
using ipchains on the XTR.
I have not had a problem on any other machines, but this XTR is the only
one that runs a web server publicly.
What concerns me most is the logs. I would assume it would not be
logging what it is without receiving some sort of impact. Hard to tell
if it has effected any services. Hasn't seemed to but I am hoping to
address it before it becomes a problem.
Agreed. And, after seeing your other post, you certainly are
receiving many SYN requests.
I noticed that the IPs on your machine were private. Are you
running NAT? If not, the attacking machine has to be pretty
close by, else it wouldn't get routed.
No I am running NAT or PAT to be specific. So they are not local
machines, definitely remote.
If you are running a firewall, I almost have to wonder... might
there be a problem with something such as ECN blocking legitimate
requests? Might the heavy hitters be proxy caches?
I do not think so, but I may have to look into that.
Somebody certainly is interested in HTTP/80 on your machine,
though. Most port scans don't look like that. One interesting
tidbit was the attempt that came from port 854 on the original
machine: On *ix boxen, one must have root to use low port
numbers.
Yes, and it is not normal web traffic because my apache logs do not show
the IP's. If someone is using port 854 on the other end, then maybe they
have root access, and know what they are doing?
Hmmmm. If no response, it is quite possible. Did you get a RST
back? Nothing at all? Did any ICMP queries respond?
Scratch that, after rescanning, all responded and I have records of the scans.
Each is not your average user. Each has some sort of firewall.
I have seen allot more SYN_RECV sockets than the six I have blocked. But
each of the six that I blocked had many simultaneous sockets active that
did not seem to time-out in a reasonable time.
The timeout is controlled on your end. If there are that many
sockets open, it sounds like <whoever> is being rather
persistent.
It sure seems like it. From a variety of IP's so I am not to sure if
it's one person using one of his platoons one me.
You might try using "whois.geektools.com" to run queries. You
can always find the origin ASN using a public route server, and
contact its POC... although IP space should be registered.
Some of the more recent ones have had DNS records. One was
cruel.and.passively.rotted.org 65.116.181.236
Still my biggest concern is the logs, since I would assume it would only
log a valid SYN attack?
I presume. I'd need to go back and review the specifics of the
Linux kernel version in question. (Somebody help me out,
here...)
Although I may be a little trigger happy. I do not think so though, I
tried to take my time and be as thorough as possible.
Yes, you did more than I ass-umed from your first post. Knowing
what I know now, I'd not say that you were trigger-happy...
blocking first and figuring out later sounds prudent.
I am still a little skeptical, but at least I know I am not blocking out
the average surfer with broadband and a mouse. :)
Eddy
Brotsman & Dreger, Inc. - EverQuick Internet Division
Phone: +1 (316) 794-8922 Wichita/(Inter)national
Phone: +1 (785) 865-5885 Lawrence
--
Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
From: A Trap <blacklist@xxxxxxxxx>
To: blacklist@xxxxxxxxx
Subject: Please ignore this portion of my mail signature.
These last few lines are a trap for address-harvesting spambots. Do NOT
send mail to <blacklist@xxxxxxxxx>, or you are likely to be blocked.
_______________________________________________
cobalt-developers mailing list
cobalt-developers@xxxxxxxxxxxxxxx
http://list.cobalt.com/mailman/listinfo/cobalt-developers
--
Sincerely,
William L. Thomson Jr.
Obsidian-Studios, Inc.
439 Amber Way
Petaluma, Ca. 94952
Phone 707.766.9509
Fax
707.766.8989
http://www.obsidian-studios.com