Hi,

I am investigating an IP fragmentation flood DOS
attack scenario where the attacker sends a string of
fragmented IP packets to exhaust the victim's fragment
cache. I've checked the IP fragment reassembly
implemention on several UNIX-like OSs. NetBSD/FreeBSD
don't handle such scenario. I was hoping Linux would
upon seeing the two cache limit syctrls. But after
looking deeper into the code, I doubt it addresses
that threat either. 

So out of curiosity, I was wondering if anyone knows
the design rationale behind the high/low cache limit
for IP fragments (e.g. sysctl_ipfrag_high(low)_thresh
in ip_defrag(), ip_fragment.c). What attack scenario
does these two sysctrls address?

Thanks,
Tony

FYI:

Detailed possible attack scenario:

A BGP router is unable to detect the PMTU with its
peer (e.g. ICMP is turned off in the intermediate
router at which the MTU decreases) and thus all
packets get fragmented. If there is an attack on its
peer that exhausts its fragment buffer space, the BGP
peering cannot be established and therefore the AS
becomes completely cut off.


       
____________________________________________________________________________________Ready
 for the edge of your seat? 
Check out tonight's top picks on Yahoo! TV. 
http://tv.yahoo.com/
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to