LVS
lvs-users
Google
 
Web LinuxVirtualServer.org

Re: Kernel Upgrade in LVS

To: "LinuxVirtualServer.org users mailing list." <lvs-users@xxxxxxxxxxxxxxxxxxxxxx>, Dave Jagoda <dj@xxxxxxxxxxx>
Subject: Re: Kernel Upgrade in LVS
From: Faruk Ahmed <faruk@xxxxxxxxx>
Date: Sat, 9 Aug 2003 23:30:18 +0700
Dear Dave,

> >> Have you heard of SYNCookies?  http://cr.yp.to/syncookies.html
> >>
> >> I think that should stop any SYN flood type of Denial of Service 
> >> attack, and also should allow all legitimate traffic to get through.
> > 
> > 
> > Search google using my name and syncookies for more information on why 
> > syn cookies have no measurable impact on reducing real DoS.
> 
> Many hits, but I think this is the relevant one:
> 
> http://www.ussg.iu.edu/hypermail/linux/kernel/0210.1/1029.html
> 
> And I think the relevant snippet is:
> 
> --- snip ----
> 
>  > I don't think these statements are entirely true. While it is true that
>  > you can't use things like window scaling or SACK - syncookies 100%
>  > successfully stop syn flood attacks.
> 
> Someone needs to adjust the text then.
> 
>  > The attack is that if you fill the syn backlog queue with bogus requests
>  > then legitimate clients can no longer connect. The syn flood attack
>  > isn't "your legitimate connections wont be able to use window scaling".
> 
> I completely agree with this definition of SYN flooding and then I will
> also say that you can 'stop' SYN flooding, well, at least you give
> legitimate clients a real chance to still successfully connect to your
> service, while it is under a SYN flood. I think we agree now. It should
> only be remarked that the line is still flooded, thus the wording "100
> stop SYN flood" is simply inappropriate in my eyes. It's all a matter of
> definition.
> 
> Regards,
> Roberto Nibali, ratz
> 
> --- snip ---
> 
> My points were these:
> 
> 1) Trying to find out who is sending too many SYNs will be very tough (I 
> think that was the idea in the first paragraph of this email).  On the 
> one hand, you have mega-proxies, which might be sending more SYNs than 
> other legitimate source IPs.  On the other hand, a SYN flood attacker 
> might just forge the source IPs, so finding the 'bad source' won't work.
> 
> 2) You aren't really stopping the attack, you are limiting the resource 
> draining effects of it so that your server can still respond to 
> legitimate requests.  I assume that for the attacker it is much less 
> gratifying to see the site has slowed down instead of stopped responding 
> altogether.  In that regard, I find SYN cookies the only way to go.
> 
> So, I guess I agree that you aren't stopping it, but if you reduce or 
> eliminate its effects, that is probably good enough.

My objective was to protect Nimda hits in the cache servers (Transparent Proxy) 
mainly. I enabled syncookies in the directors as well as in the 3 proxies, 
simulated nimda from one W2K+IIS Pentium 4 PC, but found no positive effect at 
all.

I believe that it can be filtered out in a very easy way, I am working on it 
and will post in this mailing list after successfully done.

Faruk


----------------------------------------------------------
This mail sent through AIT WebMail : http://www.ait.ac.th/
<Prev in Thread] Current Thread [Next in Thread>