netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Design intent of IP fragment cache limit?
@ 2007-06-27 20:01 Tony Zhang
  0 siblings, 0 replies; only message in thread
From: Tony Zhang @ 2007-06-27 20:01 UTC (permalink / raw)
  To: netdev

Hi,

I am investigating an IP fragmentation flood DOS
attack scenario where the attacker sends a string of
fragmented IP packets to exhaust the victim's fragment
cache. I've checked the IP fragment reassembly
implemention on several UNIX-like OSs. NetBSD/FreeBSD
don't handle such scenario. I was hoping Linux would
upon seeing the two cache limit syctrls. But after
looking deeper into the code, I doubt it addresses
that threat either. 

So out of curiosity, I was wondering if anyone knows
the design rationale behind the high/low cache limit
for IP fragments (e.g. sysctl_ipfrag_high(low)_thresh
in ip_defrag(), ip_fragment.c). What attack scenario
does these two sysctrls address?

Thanks,
Tony

FYI:

Detailed possible attack scenario:

A BGP router is unable to detect the PMTU with its
peer (e.g. ICMP is turned off in the intermediate
router at which the MTU decreases) and thus all
packets get fragmented. If there is an attack on its
peer that exhausts its fragment buffer space, the BGP
peering cannot be established and therefore the AS
becomes completely cut off.


       
____________________________________________________________________________________Ready for the edge of your seat? 
Check out tonight's top picks on Yahoo! TV. 
http://tv.yahoo.com/

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2007-06-27 20:07 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-06-27 20:01 Design intent of IP fragment cache limit? Tony Zhang

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).