public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* preventing route cache overflow
@ 2003-02-27 12:50 Patrick Michael Kane
  2003-02-27 13:21 ` Gianni Tedesco
  0 siblings, 1 reply; 2+ messages in thread
From: Patrick Michael Kane @ 2003-02-27 12:50 UTC (permalink / raw)
  To: linux-kernel

We recently had a server come under attack.  Some script monkeys
started generating a bunch of pings and SYNs from a huge variety of
spoofed addresses (mostly in 43.0.0.0/8 and 44.0.0.0/8, for those that
are interested).

There were so many forged packets that the destination cache began to
overflow hundreds or thousands of times per second ("kernel: dst cache
overflow").  This had a huge negative impact on server performance.

Adjusting net/ipv4/route/(max_size|gc_interval) or flushing the route
cache manually on a regular basis seemed to have little or no
measurable impact on the problem.  While IDS and manual filtering at
the firewall eventually resolved the problem, how do we protect
ourselves against this sort of attack in the future?  Can the route
cache be disabled?  The overflow path made less catastrophic?

TIA,
-- 
Patrick Michael Kane
<modus-linux-kernel@pr.es.to>

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2003-02-27 13:10 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2003-02-27 12:50 preventing route cache overflow Patrick Michael Kane
2003-02-27 13:21 ` Gianni Tedesco

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox