On Fri, 12 Sep 2008, Kees Cook wrote:
> Enabling syncookies disables TCP window scaling[1],

I think this is incorrect as-stated....  But this should be
  confirmed/proved/disproved.

As far as I have found out elsewhere, the syn-cookies support
  in Linux is adaptive, and does NOT come into play unless
  there is an overflow of SYN_RECVD ...

I.e. tcp window scaling DOES work with syncookies=1 -- just
  not when there is a real syn-flood-problem ... but...
  if syncookies was not enabled, such a connection would
  likely not succeed at all!  -- what is better? ;-).
  (but --see below -- situation is now different with latest
  kernel!)


> and in most situations,
> existing SYN-flood protections in the kernel
> already address most sorts of those attacks.

What are these 'existing SYN-flood protections'
  and how do they work?

Inceasing the backlog is simply increasing a finite limit --
  randomly dropping SYN_RECVD entries also makes syn-flooding
  slightly less effective relateve to forged-syn-traffic -- but
  -- it still should not actually take much traffic to overload
  the finite limits on SYN_RECVD thereby making new legitimate
  connections unlikely to succeed.

The crptographic cookie approach avoids the need for the syn
  packet backlog... and stops the repetition of syn+ack
  packehs in those cases.


> In some situations (perhaps like what alecm3 was experiencing)
> there are situations it might be needed,
I suspect that... with a busy server with many clients connecting
  a lot and connecting from slow links, it may be necessary to
  raise net.ipv4.tcp_max_syn_backlog because of legitimate
  rate/number of such not-yet-completed incoming-connections.


Its' worth reading this article:-
http://lwn.net/Articles/277146/

Seemingly 2.6.26 now supports syncookies on ipv6 too, and
  now supports connections with window-scaling even
  if connection was saved by syncookies.

Rather than having arguments over the value of the setting
  etc... --   How do we get this properly investigated
  and sorted out?

--Simon

-- 
proc/sys/net/ipv4/tcp_syncookies=1 should be seriously considered to permit SYN 
flood defense...
https://bugs.launchpad.net/bugs/57091
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to