6.6.8. TCP SYN Flood Attacks
The TCP SYN Flood attack works by sending large amounts of TCP SYN packets to a given port
and then not responding to SYN ACKs sent in response. This will tie up local TCP stack resources
on the victim machine until it is unable to respond to more SYN packets until the existing half-open
connections have timed out.
NetDefendOS will protect against TCP SYN Flood attacks if it is enabled in a Service object
associated with the rule in the IP rule set that allows the traffic. By default, this is the case for the
pre-defined services http-in, https-in, smtp-in, and ssh-in. If a new custom Service object is
defined by the administrator then Syn Flood Protection can be enabled or disabled as desired.
The "SynRelay" protection works by completing the 3-way handshake with the client before doing a
second handshake of its own with the target service. Overload situations do not occur nearly as
easily in NetDefendOS due to much better resource management and lack of restrictions normally
placed upon a full-blown operating system. While a normal operating system can exhibit problems
with as few as 5 outstanding half-open connections, NetDefendOS can fill its entire state table
(thousands or millions of connections, depending on your product model), before anything out of
the ordinary happens. When the state table fills up, old outstanding SYN connections will be among
the first to be dropped to make room for new connections.
TCP SYN Flood attacks will show up in NetDefendOS logs as excessive amounts of new
connections (or drops, if the attack is targeted at a closed port). The sender IP address is almost
invariably spoofed.
It should be noted that if Syn Flood Protection is enabled on a Service object and that Service object
has an ALG associated with it then the ALG will be disabled.
6.6.9. The Jolt2 Attack
The Jolt2 attack works by sending a steady stream of identical fragments at the victim machine. A
few hundred packets per second will freeze vulnerable machines completely until the stream is
ended.
NetDefendOS will protect completely against this attack. The first fragment will be queued, waiting
for earlier fragments to arrive so that they may be passed on in order, but this never happens, so not
even the first fragment gets through. Subsequent fragments will be thrown away as they are identical
to the first fragment.
If the attacker chooses a fragment offset higher than the limits imposed by the Advanced Settings >
LengthLim in NetDefendOS, the packets will not even get that far; they will be dropped
immediately. Jolt2 attacks may or may not show up in NetDefendOS logs. If the attacker chooses a
too-high fragment offset for the attack, they will show up as drops from the rule set to
"LogOversizedPackets". If the fragment offset is low enough, no logging will occur. The sender IP
address may be spoofed.
6.6.10. Distributed DoS Attacks
A more sophisticated form of DoS is the Distributed Denial of Service (DoS) attack. DDoS attacks
involve breaking into hundreds or thousands of machines all over the Internet to installs DDoS
software on them, allowing the hacker to control all these burgled machines to launch coordinated
attacks on victim sites. These attacks typically exhaust bandwidth, router processing capacity, or
network stack resources, breaking network connectivity to the victims.
Although recent DDoS attacks have been launched from both private corporate and public
institutional systems, hackers tend to often prefer university or institutional networks because of
their open, distributed nature. Tools used to launch DDoS attacks include Trin00, TribeFlood
Network (TFN), TFN2K and Stacheldraht.
6.6.9. The Jolt2 Attack
Chapter 6. Security Mechanisms
279
Содержание 800 - DFL 800 - Security Appliance
Страница 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Страница 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Страница 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Страница 166: ...interfaces without an overriding IGMP Setting Default 1 000 4 6 4 Advanced IGMP Settings Chapter 4 Routing 166 ...
Страница 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Страница 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Страница 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Страница 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Страница 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Страница 303: ... Changed on a regular basis such as every three months 8 1 Overview Chapter 8 User Authentication 303 ...
Страница 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Страница 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Страница 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Страница 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Страница 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Страница 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Страница 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...