免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 6165 | 回复: 2
打印 上一主题 下一主题

High TCP connect timeout rate! System (port 80) [复制链接]

论坛徽章:
1
IT运维版块每日发帖之星
日期:2016-07-29 06:20:00
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2008-08-01 12:11 |只看该作者 |倒序浏览
v445安装的是solaris 9出现High TCP connect timeout rate! System (port 80)问题,在网上只查到对于solaris 2.5.1,只有安装了patch 103582-1(或以上)才能防止syn_flood.在solaris 9下如何解决啊,

论坛徽章:
0
2 [报告]
发表于 2008-08-01 12:39 |只看该作者
9上有相应的补丁的 在sunsolve上有相关的alert,你可以查一下

论坛徽章:
0
3 [报告]
发表于 2008-08-01 15:26 |只看该作者
刚看过一个,看有帮助没有
Document Audience:        PUBLIC
Document ID:        200864
Title:        Security Vulnerability in the TCP Implementation of Solaris Systems May Allow a Denial of Service When Accepting New Connections While Undergoing a TCP "SYN Flood" Attack
Copyright Notice:        Copyright ? 2008 Sun Microsystems, Inc. All Rights Reserved
Update Date:        Wed Jul 30 00:00:00 MDT 2008

Solution Type Sun Alert

Solution  200864 :   Security Vulnerability in the TCP Implementation of Solaris Systems May Allow a Denial of Service When Accepting New Connections While Undergoing a TCP "SYN Flood" Attack  
Related Categories
Home>Content>Sun Alert Criteria Categories>Security

Home>Content>Sun Alert Release Phase>Resolved



Bug ID
6402737


Product
Solaris 8 Operating System, Solaris 9 Operating System, Solaris 10 Operating System


Date of Resolved Release
06-May-2008


SA Document Body
Security Vulnerability in the TCP Implementation of Solaris Systems May Allow a Denial of Service When Accepting New Connections While Undergoing a TCP "SYN Flood" Attack

1. Impact


A security vulnerability in the TCP implementation of Solaris 8, 9 and 10 may allow a remote unprivileged user to cause a Solaris system which is undergoing a "TCP SYN" flood condition to be slow to accept new network connections.  Such network connections may time out without establishing a connection.  This would lead to a Denial of Service (DoS) to the network services provided by that system. In addition, a uniprocessor system may also experience overall slowdown due to high CPU usage, resulting in a Denial of Service to the system as a whole.

2. Contributing Factors


This issue can occur in the following releases:

SPARC Platform
Solaris 8 without patch 116965-33
Solaris 9 without patch 114344-35
Solaris 10 without patch 119998-01

x86 Platform
Solaris 8 without patch 116966-32
Solaris 9 without patch 119435-23
Solaris 10 without patch 119999-01

Note:  This issue affects hosts which have a value for the ndd(1M) tunable 'tcp_conn_req_max_q0' which is considerably higher than the default value of 1024. The higher the value, the greater the impact of this issue if it is exploited on a host. While a value close to or less than 1024 does not make the system immune to a Denial of Service, it decreases the impact of a DoS on the system.

To determine the value of the 'tcp_conn_req_max_q0' tunable, the following command can be used:
    $ ndd -get /dev/tcp tcp_conn_req_max_q0
    1024

3. Symptoms


If this issue is exploited, the following message may be seen on the console:
    WARNING: High TCP connect timeout rate!
    System (port <port number>) may be under a SYN flood attack

4. Workaround


To work around the described issue, make sure the value of the ndd(1M) tunable 'tcp_conn_req_max_q0' for TCP is not much higher than the default of 1024, using commands such as the following:
    $ ndd -get /dev/tcp tcp_conn_req_max_q0
    4000
    $ ndd -set /dev/tcp tcp_conn_req_max_q0 1024
    $ ndd -get /dev/tcp tcp_conn_req_max_q0
    1024

5. Resolution


This issue is addressed in the following releases:

SPARC Platform
Solaris 8 with patch116965-33 or later
Solaris 9 with patch 114344-35 or later
Solaris 10 with patch 119998-01 or later

x86 Platform
Solaris 8 with patch 116966-32 or later
Solaris 9 with patch 119435-23 or later
Solaris 10 with patch 119999-01 or later
Note: There are additional Solaris 8 and 9 patches which list 6402737 in their README, however these patches are not required to address the issue described in this Sun Alert. These additional patches deliver an updated kernel debugger (kadb(1M)). The patch-IDs are:

SPARC Platform
Solaris 8 patch 117350-54 or later
Solaris 9 patch 122300-25 or later
x86 Platform
Solaris 8 patch 117351-54 or later
Solaris 9 patch 122301-25 or later

[ 本帖最后由 dogg 于 2008-8-1 15:27 编辑 ]
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP