Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 18 Jan 2000 22:56:56 -0800 (PST)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        Brett Glass <brett@lariat.org>
Cc:        Wes Peters <wes@softweyr.com>, patl@phoenix.volant.org, David Wolfskill <dhw@whistle.com>, matt@ARPA.MAIL.NET, freebsd-security@FreeBSD.ORG
Subject:   Re: TCP/IP
Message-ID:  <200001190656.WAA33816@apollo.backplane.com>
References:  <ML-3.4.948228615.4905.patl@asimov.phoenix.volant.org> <388557FB.443E66B0@softweyr.com> <4.2.2.20000118234610.01dd9b60@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
:True. But one can minimize the damage. The best way to do this seems to be
:via a pseudorandom sequence number on the SYN-ACK, which eliminates the need
:for the server to retain any state after the SYN.
:
:--Brett

    Assuming you have bandwidth left to play with.  Unfortunately the problem
    tends to be that such attacks saturate your internet link, making it
    unusable.

    Generally speaking SYN attacks are related to IRC weenies.  The best way
    to avoid them is usually to (a) not run an irc server and (b) not allow
    your users to run irc bots.

					-Matt
					Matthew Dillon 
					<dillon@backplane.com>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001190656.WAA33816>