[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2018-05-24 Thread Simon Iremonger
FWIW Although syncookies has long-since been enabled upstream, the outdated comments in sysctl about syncookies still persist, I have now created new ubuntu bug #1773157 [please comment there]. [This also requests ECN-on-outgoing enablement which has similarly matured etc.]. -- You receive

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2017-12-11 Thread Nils Toedtmann
I filed a request for ufw not to override https://bugs.launchpad.net/ubuntu/+source/ufw/+bug/1737585 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/57091 Title: proc/sys/net/ipv4/tcp_syncookies=1 sho

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2016-10-07 Thread Matthew Caron
Will do, Simon. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/57091 Title: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense... To manage notifications

Re: [Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2016-10-07 Thread Simon Iremonger
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 > Bog standard 16.04 has it turned on (from the above referenced 10 > -network-security.conf). > But, if you then enabled ufw, it gets disabled, due to the default > setting in /etc/ufw/sysctl.conf. > There seems to be serious debate as to whether o

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2016-10-06 Thread Matthew Caron
Well, and it gets more interesting. Bog standard 16.04 has it turned on (from the above referenced 10 -network-security.conf). But, if you then enabled ufw, it gets disabled, due to the default setting in /etc/ufw/sysctl.conf. There seems to be serious debate as to whether or not enabling it is

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2016-05-18 Thread antisa
Here is the entry from ...10-network-security.conf from 16.04 (although from Desktop edition) " # Turn on SYN-flood protections. Starting with 2.6.26, there is no loss # of TCP functionality/features under normal conditions. When flood # protections kick in under high unanswered-SYN load, the sy

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2016-02-15 Thread Simon Iremonger
Upstream kernel have decided to enable syncookies by default (according to that debian bug, since Linux 2.6.37!). This makes sense, as the main downsides have already been resolved (especially window scaling even under syncookies-activation), and this feature only kicks-in if the SYN-queue is ov

Re: [Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-10-09 Thread Simon Iremonger
On Fri, 9 Oct 2009, Olaf van der Spek wrote: > Has this request been forwarded upstream (lkml)? Not that I am aware of. It would be good for this confusion/misinformation to get sorted out properly. Why is it that some wish to make sweeping statements and not understand the whole situation?

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-10-09 Thread Olaf van der Spek
Has this request been forwarded upstream (lkml)? -- proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense... https://bugs.launchpad.net/bugs/57091 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -

Re: [Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-09-25 Thread Simon Iremonger
>> Ah, nice. I kinda expected a link to the package version in which it got fixed. The silly thing is There is misinformation in the /etc/sysctl.conf now! It says:- "# This disables TCP Window Scaling (http://lkml.org/lkml/2008/2/5/167)" First of all that is incorrect as a blanket statement.

Re: [Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-09-25 Thread Olaf van der Spek
On Fri, Sep 25, 2009 at 4:56 PM, Kees Cook wrote: > Olaf: that's why it is "fix released".  :)  It is enabled in Ubuntu now. Ah, nice. I kinda expected a link to the package version in which it got fixed. -- proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood

Re: [Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-09-25 Thread Olaf van der Spek
Ah, nevermind, I can't read, it's at the bottom of that message. On Fri, Sep 25, 2009 at 5:18 PM, Olaf van der Spek wrote: > On Fri, Sep 25, 2009 at 4:56 PM, Kees Cook wrote: >> Olaf: that's why it is "fix released".  :)  It is enabled in Ubuntu now. > > Ah, nice. I kinda expected a link to the

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-09-25 Thread Kees Cook
Olaf: that's why it is "fix released". :) It is enabled in Ubuntu now. -- proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense... https://bugs.launchpad.net/bugs/57091 You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-09-25 Thread Olaf van der Spek
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520668 ** Bug watch added: Debian Bug tracker #520668 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520668 -- proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense... https://bugs.launchpad.net/bugs/5

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-09-25 Thread Olaf van der Spek
Are there any updates on this issue? I don't see any counter arguments to the fact syn cookies only take effect after the queue is full. Ideally this would be changed upstream, maybe an Ubuntu kernel dev could contact upstream about this? -- proc/sys/net/ipv4/tcp_syncookies=1 should be seriousl

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-05-19 Thread pablomme
> Yes please. Ok. > I would initially assume that some other issue has caused the > kernel to stop handling network traffic rather than high network traffic > stopping the kernel. The kernel did not stop, nor did the networking or anything else other than X. -- proc/sys/net/ipv4/tcp_syncookies

Re: [Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-05-19 Thread Kees Cook
On Tue, May 19, 2009 at 04:11:18PM -, pablomme wrote: > Should I open a new bug report with this? Yes please. I would initially assume that some other issue has caused the kernel to stop handling network traffic rather than high network traffic stopping the kernel. -- proc/sys/net/ipv4/tcp_

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-05-19 Thread pablomme
I think this may have introduced a regression. While using aMule on my amd64 Jaunty desktop, there is a point at which the screen freezes and X stops responding to input (the mouse pointer moves, but it does not interact with anything). Ctrl-Shift-F1-6 won't drop me to a TTY. I believe the hang aff

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2009-02-09 Thread Kees Cook
procps (1:3.2.7-11ubuntu1) jaunty; urgency=low * Merge from debian unstable, remaining changes: - debian/{postinst,rules}: init script to priority 17, remove on upgrade. - debian/rules (Ubuntu-specific): - install sysctl files from new sysctl.d directory. - append debian/sysc

Re: [Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2008-10-23 Thread Simon Iremonger
On Thu, 23 Oct 2008, KimOlsen wrote: >> "...option causes the system to violate the TCP standard..." > I do not think this is the case. If you check RFC4732 they list this as > a possible way to help against DoS attacks. > I also believe that window scaling is not affected, but large windows > are

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2008-10-23 Thread KimOlsen
>"...option causes the system to violate the TCP standard..." I do not think this is the case. If you check RFC4732 they list this as a possible way to help against DoS attacks. I also believe that window scaling is not affected, but large windows are. But accepting legit traffic without large wi

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2008-09-26 Thread enyc
** Changed in: ubuntu Status: Invalid => Incomplete -- proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense... https://bugs.launchpad.net/bugs/57091 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2008-09-14 Thread Simon Iremonger
On Fri, 12 Sep 2008, Kees Cook wrote: > Enabling syncookies disables TCP window scaling[1], I think this is incorrect as-stated But this should be confirmed/proved/disproved. As far as I have found out elsewhere, the syn-cookies support in Linux is adaptive, and does NOT come into play u

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2008-09-12 Thread Kees Cook
Enabling syncookies disables TCP window scaling[1], and in most situations, existing SYN-flood protections in the kernel already address most sorts of those attacks. In some situations (perhaps like what alecm3 was experiencing) there are situations it might be needed, but for a default, I am

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2008-09-12 Thread alecm3
We installed 2 production servers and suddenly we started getting strange connection problems, with no errors in the application or system logs. The problems were highly intermittent, but amounted to being unable to connect to a port our TCP server was receiving client internet connections on. Aft

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2006-09-08 Thread Matt Zimmerman
SYN cookies are disabled by default in Ubuntu for the same reason they are disabled by default in the kernel. According to the kernel documentation, use of this option causes the system to violate the TCP standard, and so is only intended to be used to mitigate an attack in progress. ** Changed i

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2006-09-03 Thread enyc
Jeremy, I can confirm that SYNcookies are NOT part of the firewall mechanism of the kernel. CONFIG_NETFILTER option in linux 2.6 is the toggle for linux packet filtering support called 'netfilter'(iptables)... There are many sub- choices/options for netfilter. CONFIG_SYN_COOKIES however is a dif

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2006-08-31 Thread Jeremy Vies
Sorry, I didn't know that ftp was not a server program... My point of view is that it should not be activated by default, but should be easily configurable with a GUI, probably the same GUI that should configure the FW. I add the ubuntu network team and the ubuntu security team to the bug. -- p

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2006-08-21 Thread Jeremy Vies
For me syncookies is the same problem as FW is. As you said, as long as you don't start a network service, your computer is safe. If you start a SSH server or whatever, you have to protect your system from DoS or other attacks... (By the way, if your server is reachable from the internet, as soo

[Bug 57091] Re: [Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2006-08-21 Thread enyc
On Mon, 21 Aug 2006, Jeremy Vies wrote: > I think "tcp_syncookies" is considered as part of the FW mechanism of the > kernel. > As Dapper (and previous releases) does not provide any FW out of the box, it > is normal that tcp_syncookies are not activated by default. > Your bug repport should be p

[Bug 57091] Re: proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN flood defense...

2006-08-21 Thread Jeremy Vies
Hi enyc, I think "tcp_syncookies" is considered as part of the FW mechanism of the kernel. As Dapper (and previous releases) does not provide any FW out of the box, it is normal that tcp_syncookies are not activated by default. Your bug repport should be put as a wish for next release, and maybe