English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

2006-10-12 16:40:42 · 5 answers · asked by Anonymous in Computers & Internet Internet

5 answers

Dear,

What is a SYN Attack?

This DoS attack essentially involves flooding a server with a barrage of hand-crafted requests for connection. However, since these messages have invalid return addresses, the connections can never be established. The resulting volume of unresolved open connections eventually overwhelms the server and can cause it to deny service to valid requests. While this scheme does not represent a networking security compromise in itself, it can paralyze on-line services. This mechanism exploits the connection-oriented TCP protocol (which is used to carry the vast majority of Internet applications) and because the attack is an abuse of the defined standard for TCP, this vulnerability exists to some degree in all implementations.

The TCP protocol uses a "three-way handshake" to set up an end-to-end connection before data flows. Assume client 'C' wants to establish a connection to server 'S'. C first sends a SYN packet (a TCP packet with the SYN bit set) to S. The server S then replies with a SYN/ACK packet (both SYN and ACK bits set), allowing S to complete the three-way hand-shake with a TCP ACK packet.

However if a flood of incoming request packets have invalid source IP addresses, sessions never get established and remain as half-open connections. Many TCP implementations are only able to handle a small number of outstanding connections per port therefore these ports are effectively unavailable until the half-open connections time-out (typically 75 seconds). Additionally this attack may also cause the server to exhaust its memory or waste processor cycles in maintaining state information on these connections.

Some efforts to combat this DoS attack centered around packet filtering capabilities which allow only known addresses to access resources and also on installing software upgrades available from some of the host and server manufacturers. However for Internet-wide services such as Web servers, controlling access based upon incoming address is not feasible and upgrading the servers themselves may only partially help and is typically a significant undertaking.

Abstract
There is a potential denial of service attack at internet service providers (ISPs) that targets network devices.

TCP SYN attack: A sender transmits a volume of connections that cannot be completed. This causes the connection queues to fill up, thereby denying service to legitimate TCP users.

This paper contains a technical description of how the potential TCP SYN attack occurs and suggested methods for using Cisco IOS software to defend against it.

Note: Cisco IOS 11.3 software has a feature to actively prevent TCP denial of service attacks. This feature is described in the document Configuring TCP Intercept (Prevent Denial-of-Service Attacks).

Prerequisites
Requirements
There are no specific prerequisites for this document.

Components Used
This document is not restricted to specific software and hardware versions.

The information presented in this document was created from devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If you are working in a live network, ensure that you understand the potential impact of any command before using it.

Conventions
For more information on document conventions, see the Cisco Technical Tips Conventions.

Problem Description
The TCP SYN Attack
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN ACK before the connection is established. This is referred to as the "TCP three-way handshake."

While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.

The TCP SYN attack exploits this design by having an attacking source host generate TCP SYN packets with random source addresses toward a victim host. The victim destination host sends a SYN ACK back to the random source address and adds an entry to the connection queue. Since the SYN ACK is destined for an incorrect or non-existent host, the last part of the "three-way handshake" is never completed and the entry remains in the connection queue until a timer expires, typically for about one minute. By generating phony TCP SYN packets from random IP addresses at a rapid rate, it is possible to fill up the connection queue and deny TCP services (such as e-mail, file transfer, or WWW) to legitimate users.

There is no easy way to trace the originator of the attack because the IP address of the source is forged.

The external manifestations of the problem include inability to get e-mail, inability to accept connections to WWW or FTP services, or a large number of TCP connections on your host in the state SYN_RCVD.

Defending Against Attacks on Network Devices
Devices Behind Firewalls
The TCP SYN attack is characterized by an influx of SYN packets from random source IP addresses. Any device behind a firewall that stops inbound SYN packets is already protected from this mode of attack and no further action is needed. Examples of firewalls include a Cisco Private Internet Exchange (PIX) Firewall or a Cisco router configured with access lists. For examples of how to set up access lists on a Cisco router, please refer to the document Increasing Security On IP Networks.

Devices Offering Publicly Available Services (Mail Servers, Public Web Servers)
Preventing SYN attacks on devices behind firewalls from random IP addresses is relatively simple since you can use access lists to explicitly limit inbound access to a select few IP addresses. However, in the case of a public web server or mail server facing the Internet, there is no way to determine which incoming IP source addresses are friendly and which are unfriendly. Therefore, there is no clear cut defense against an attack from a random IP address. Several options are available to hosts:

Increase the size of the connection queue (SYN ACK queue).

Decrease the time-out waiting for the three-way handshake.

Employ vendor software patches to detect and circumvent the problem (if available).

You should contact your host vendor to see if they have created specific patches to address the TCP SYN ACK attack.

Note: Filtering IP addresses at the server is ineffective since an attacker can vary his IP address, and the address may or may not be the same as that of a legitimate host.

Preventing A Network from Unwittingly Hosting an Attack
Since a primary mechanism of this denial of service attack is the generation of traffic sourced from random IP addresses, we recommend filtering traffic destined for the Internet. The basic concept is to throw away packets with invalid source IP addresses as they enter the Internet. This does not prevent a denial of service attack on your network, but will help attacked parties rule out your location as the source of the attacker. In addition, it makes your network less attractive as a base for this class of attack.

Preventing Transmission of Invalid IP Addresses
By filtering packets on your routers that connect your network to the Internet, you can permit only packets with valid source IP addresses to leave your network and get into the Internet.

For example, if your network consists of network 172.16.0.0, and your router connects to your ISP using a serial 0/1 interface, you can apply the access list as follows:

access-list 111 permit ip 172.16.0.0 0.0.255.255 any
access-list 111 deny ip any any log

interface serial 0/1
ip access-group 111 out
Note: The last line of the access list determines if there is any traffic with an invalid source address entering the Internet. It is not crucial to have this line, but it will help locate the source of the possible attacks.

Preventing Reception of Invalid IP Addresses
For ISPs who provide service to end networks, we highly recommend the validation of incoming packets from your clients. This can be accomplished by the use of inbound packet filters on your border routers.

For example, if your clients have the following network numbers connected to your router via a serial interface named "serial 1/0", you can create the following access list:

The network numbers are 192.168.0.0 to 192.168.15.0, and 172.18.0.0.

access-list 111 permit ip 192.168.0.0 0.0.15.255 any
access-list 111 permit ip 172.18.0.0 0.0.255.255 any
access-list 111 deny ip any any log

interface serial 1/0
ip access-group 111 in
Note: The last line of the access list determines if there is any traffic with invalid source addresses entering the Internet. It is not crucial to have this line, but it will help locate the source of the possible attack.


In case of further issues regarding computers & internet dont forget to contact via...
Yahoo! Groups
vijaysomanath - Customer Support Knowledge Database,
http://tech.groups.yahoo.com/group/vijaysomanath

¤ Regards, vijaysomanath
¤ http://www.spaces.msn.com/vijaysomanath
¤ Copyright © 1999-2006 vijaysomanath. All rights reserved.

2006-10-12 16:44:30 · answer #1 · answered by Anonymous · 0 0

Whenever a syn packet is sent, the server responding allocates some memory for the TCP session that is 'supposedly' about to start. This memory is allocated for a certain timeout period and then released if there is no further communication. If you continually hammer a server with new syn packets, it will allocated more and more memory until it runs out. The server then usually has a heart attack.

That's the way the theory goes, however certain measures are taken in modern environments to stop this from happening.

2006-10-12 16:46:04 · answer #2 · answered by teef_au 6 · 0 0

First of all, a pharmacist has the legal right to refuse to fill any prescription as long as they do not base the decision on race, religion or national origin. In this case there sounds like something is being left out. Custom stocking are not normally paid for at a retail pharmacy in the first place. As they are not considered a medication, they do not have the needed ndc number in order to be billed under someones prescription plan. Most retail pharmacies no not even have the sources to obtain such items from. These normally must be purchased at a medical supplier and billed under the customers major medical. The pharmacist should have told your father simply to go to a medical supplier and they will be able to take care of it for him. I have literally handled several hundred requests over the years like this. It is not a point of denying service but finding someone who can provide the required service.

2016-03-18 08:22:37 · answer #3 · answered by Anonymous · 0 0

Maybe, but I don't know 100%

2016-08-08 17:04:31 · answer #4 · answered by Anonymous · 0 0

why are all the answers so short these days?

2016-08-23 08:41:55 · answer #5 · answered by Anonymous · 0 0

fedest.com, questions and answers