Forum Discussion
smp_86112
Cirrostratus
Jan 22, 2009Methodolgy to ID source of DOS attack
Recently, I started receiving SNMP traps from an LTM pair indicating it was the target of a possible DOS attack.
Limiting open port RST response from 16170 to 250 packets/sec
I started scrambling trying to figure out the source of the attack, but I came up short. I was wondering what LTM commands could have helped me identify the source IP?
- hoolio
Cirrostratus
Do the embryonic connections show up in netstat -a output? Or do they have forged source IP addresses? I'm curious to see what options there are for tracing SYN floods. - smp_86112
Cirrostratus
After the lack of response to this, I am questioning whether people think I'm just dumb and shouldn't be asking something so obvious, or if this is something most people don't see or bother to look into. - hoolio
Cirrostratus
It's not something I've ever been asked about or seen in customer implementations. - JRahm
Admin
Sol 9259 (Click here) seems to indicate that this message results from the sourced packets not being SYN packets or part of the current connection table. - dennypayne
Employee
Posted By smp on 01/28/2009 7:19 AM
- Jon_Strabala_46
Nimbostratus
I just started seeing some RST messages one about every 1-2 hours. From this thread it seems that Sol 9259 (as discussed above) seems to indicate that this message results from the sourced packets not being SYN packets or part of the current connection table. Thus it seems that the RST messages are not part of normal traffic.
Obviously dropping from 251 to 250 packet/sec seems like nothing to worry about, but my traffic pattern will go up by a factor of 25 in the next few weeks (since only a part of our client base has been routed to the F5 right now).[f5user@www:Active] log grep RST ltm [f5user@www:Active] log gunzip -c ltm.* | grep RST Apr 28 13:56:52 local/tmm warning tmm[1350]: 011e0001:4: Limiting open port RST response from 251 to 250 packets/sec Apr 28 17:23:02 local/tmm warning tmm[1350]: 011e0001:4: Limiting open port RST response from 251 to 250 packets/sec Apr 28 17:47:22 local/tmm warning tmm[1350]: 011e0001:4: Limiting open port RST response from 251 to 250 packets/sec Apr 28 18:24:02 local/tmm warning tmm[1350]: 011e0001:4: Limiting open port RST response from 251 to 250 packets/sec Apr 28 19:19:15 local/tmm warning tmm[1350]: 011e0001:4: Limiting open port RST response from 251 to 250 packets/sec Apr 28 20:41:25 local/tmm warning tmm[1350]: 011e0001:4: Limiting open port RST response from 251 to 250 packets/sec Apr 28 22:52:57 local/tmm warning tmm[1350]: 011e0001:4: Limiting open port RST response from 251 to 250 packets/sec [f5user@www:Active] log grep RST ltm
- Hamish
Cirrocumulus
Mmm..... What the BigIP is doing is sending a RST packet because it's recieved a tcp packet for a connection that doesn't exist, and the recieved packet DOES NOT have the SYN flag set... In this respect the F5 is behaving exactly like any other IP host... If an IP stack recieves a packet without the SYN flag set for a connection that doesn't eist in the connection table, the host sends back a RST to tell the sending host that the connection doesn't exist and they need to reset their state.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects