Re: PROBLEM: DoS Attack on Fragment Cache

2021-04-19 Thread Matt Corallo
thers here that actually solving the DoS issue isn't trivial, but making it less absurdly trivial to have 30 second dropouts of your VPN connection would also be a nice change. Matt On 4/19/21 05:43, Eric Dumazet wrote: On Sun, Apr 18, 2021 at 4:31 PM Matt Corallo wrote: Should the default

Re: PROBLEM: DoS Attack on Fragment Cache

2021-04-18 Thread Matt Corallo
Should the default, though, be so low? If someone is still using a old modem they can crank up the sysctl, it does seem like such things are pretty rare these days :). Its rather trivial to, without any kind of attack, hit 1Mbps of lost fragments in today's networks, at which point all fragments

Re: PROBLEM: DoS Attack on Fragment Cache

2021-04-17 Thread Matt Corallo
be hard to launch the attack(evicting the legit fragment before it's assembled requires a large packet sending rate). And this seems better than the existing solution (drop all incoming fragments when full). Keyu On Sat, Apr 17, 2021 at 6:30 PM Matt Corallo wrote: See-also "[PATCH] R

Re: PROBLEM: DoS Attack on Fragment Cache

2021-04-17 Thread Matt Corallo
See-also "[PATCH] Reduce IP_FRAG_TIME fragment-reassembly timeout to 1s, from 30s" (and the two resends of it) - given the size of the default cache (4MB) and the time that it takes before we flush the cache (30 seconds) you only need about 1Mbps of fragments to hit this issue. While DoS attacks