Hi, I am investigating an IP fragmentation flood DOS attack scenario where the attacker sends a string of fragmented IP packets to exhaust the victim's fragment cache. I've checked the IP fragment reassembly implemention on several UNIX-like OSs. NetBSD/FreeBSD don't handle such scenario. I was hoping Linux would upon seeing the two cache limit syctrls. But after looking deeper into the code, I doubt it addresses that threat either.
So out of curiosity, I was wondering if anyone knows the design rationale behind the high/low cache limit for IP fragments (e.g. sysctl_ipfrag_high(low)_thresh in ip_defrag(), ip_fragment.c). What attack scenario does these two sysctrls address? Thanks, Tony FYI: Detailed possible attack scenario: A BGP router is unable to detect the PMTU with its peer (e.g. ICMP is turned off in the intermediate router at which the MTU decreases) and thus all packets get fragmented. If there is an attack on its peer that exhausts its fragment buffer space, the BGP peering cannot be established and therefore the AS becomes completely cut off. ____________________________________________________________________________________Ready for the edge of your seat? Check out tonight's top picks on Yahoo! TV. http://tv.yahoo.com/ - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html