Stopping SYN floods.

Chris Thornhill (penguin@dune.dp.org)
Thu, 17 Oct 1996 19:34:22 -0300 (ADT)


Hello,

I seems the cool hackerish thing to these days is to flood someones
port with spoofed SYN packets, disallowing any further connections
to the port. Okay, fine. It seems to me that there is an easy
solution to this (in theory). Forgive my lack of proper terminology
here, but couldn't the tcp/ip stack be written so that if its connection
table for a particular port fills, the next incoming SYN packet immediatly
causes the oldest connection that is waiting for an ACK from it's SYNACK
to time out?

Just wanted to get a few peoples thoughts on the matter. :)

- Chris

P.S. Sorry about that run on sentence. :)