[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [cobalt-developers] SYN flooding



    We have enabled syncookies by default since the Qube-2 and
    RaQ-2.  There is a slight increase in overhead under extreme
    load, but nothing to be concerned about.  The 250 MHz Qube-2
    under a saturated 100baseT SYN flood attack still supported
    reasonable network behavior.  The x86 line doesn't even break
    a sweat.

    Turning the cookies off is probably a bad idea.  Without them,
    a SYN flood is likely to shut down your server until the flood
    ends. (To be precise, the flood makes it very difficult to
    create new connections.)

    I tend to side with Eddy Dreger's note that blocking the IP
    address might be extreme.  Most SYN flood attackers spoof the
    source address.

    You can use tcpdump to verify the alleged source of the flood.
    If you are being hit with a spoofed attack, you should see a
    TCP RST reply to your system's SYN-ACK.  (Because the spoofed
    source didn't actually initiate the connection, it sends a
    reset, rather than continuing with data).

    You can also use tcpdump to count the SYN bytes-per-second.
    This will give you an estimate of the size of the network
    feed being used to hit you.  It will also give you an idea
    of how much it is costing (lost bandwidth == $$'s).

    Finally, I would try to back trace the packets.  Your upstream
    network ought to help if you can bypass the front line tech
    support (knowing the $$'s figure should help here).  From there
    on, you get to enter service provider support hell.  Also, if
    you verify that the source address is spoofed, the spoofee may
    be interested in helping to hunt down the spoofer.  Afterall,
    for every SYN you get and SYN-ACK you make, the spoofee gets an
    unexpected SYN-ACK on his network, and has to send a RST.

    If you are still under attack and hit a roadblock tracing the
    packets, send another note.  This is an area where friends of
    friends of friends can prove useful, and the Cobalt developer
    list is pretty well connected.

    Hope this helps,

    cj*