On Thursday 23 March 2006 12:58, Rick Jones wrote:
> > For a sender, defense is more difficult because you can't throw away
> > unacknowledged data.  An attacker can consume 2*mss kernel memory per ack
> > it
>
> WIth ABC in place, isn't that "up to" or "no more than?"  And that is
> only if the connection is still in the slow-start phase rather than
> bandwidth probing.

Yes.  I'm using worst case here as an example, because I'm trying to 
illustrate that even this worst case is not as bad as just opening a new 
connection.


> Would having a lower initial cap on ssthrsh than "whatever the remote
> advertises" - say at the present default wmax - be some middle ground?
> It might not be completely optimal for those high bandwidth delay
> product links but it would mean that once a connection got to current
> wmax it would be in the MSS per window realm rather than the other.

This would be a real performance killer, and I don't think it buys you much, 
as the window-inflating attack isn't the primary concern.


> > sends, and hold on to it indefinitely.
>
> Is it really indefinite?  I would think that it would be no longer than
> it takes the sender to hit his retransmission limits?

No, it's not really indefinite, unless the attacker sends out an ack every few 
minutes (which requires extra state).  It's easier and a more effective 
attack to create new connections if you can.


> Doesn't the sending "attack" presume that there is a willing accomplice
> on the system - something that both has and is willing to send that
> large quantity of data to the remote?

Yes, for the window inflating attack.  For the simple attack of creating lots 
of connections, a simple web server with some small (16k) objects to fetch is 
adequate.

  -John
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to