From: "Wolfpaw - Dale Corse" <admin@wolfpaw.net>
To: <alan@lxorguk.ukuu.org.uk>
Cc: <peter@mysql.com>, <linux-kernel@vger.kernel.org>, <netdev@oss.sgi.com>
Subject: RE: Linux 2.4.27 SECURITY BUG - TCP Local andREMOTE(verified)Denial of Service Attack
Date: Sun, 12 Sep 2004 13:18:46 -0600 [thread overview]
Message-ID: <002801c498fd$536d33f0$0200a8c0@wolf> (raw)
In-Reply-To: <02bd01c498fc$fe1954b0$0300a8c0@s>
> On Sul, 2004-09-12 at 19:40, Wolfpaw - Dale Corse wrote:
> > This bug also exists with Apache, the default config of SSH, and
> > anything controlled by inetd. This is the vast majority of popular
> > services on a regular internet server.. That is bad, no?
>
> I'm unable to duplicate any such problems with xinetd, or
> with thttpd, or with apache. Apache will wait a short time
> then timeout connections if you've configured it right. If
> you can continue making millions of connections a second you
> can DoS the server the other end, not exactly new news. The
> alternative is that you have an infinite number of running
> services and you run out of memory instead.
Slackware doesn't use xinetd, but rather inetd. Is inetd an
old version which is no longer maintained? Apache, it didn't
kill, but slowed it down quite a bit. You are correct for sure
on that point though, there is nothing that can be done about
connection floods.
> Thats a high level property of any protocol which allows
> commitment of resource without being able to do the security
> authentication first. Its very hard to create ones that don't
> however, thus most devices in life (eg your telephone) have
> this form or DoS attack.
Very true :(
> My sshd also doesn't show this problem and the manual page
> indicates it has a 120 second grace timeout for authentication.
>
> The sshd manual page says:
>
> Gives the grace time for clients to authenticate themselves
> (default 120 seconds).
Again - likely a connection flooding DoS there.. Which can't be helped
Unless you use ipchains to limit the amount of connections per ip
address.
Thanks for the reply :)
D.
next parent reply other threads:[~2004-09-12 19:18 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <02bd01c498fc$fe1954b0$0300a8c0@s>
2004-09-12 19:18 ` Wolfpaw - Dale Corse [this message]
[not found] <02be01c498fd$3b63a370$0300a8c0@s>
2004-09-12 19:36 ` Linux 2.4.27 SECURITY BUG - TCP Local andREMOTE(verified)Denial of Service Attack Wolfpaw - Dale Corse
2004-09-13 10:49 ` Alan Cox
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='002801c498fd$536d33f0$0200a8c0@wolf' \
--to=admin@wolfpaw.net \
--cc=alan@lxorguk.ukuu.org.uk \
--cc=linux-kernel@vger.kernel.org \
--cc=netdev@oss.sgi.com \
--cc=peter@mysql.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).