Package: xtables-addons-dkms
Version: 3.23-1
Severity: wishlist

Dear Maintainer,

I am just thinking to install a tarpit on my host. I read various
docs found on the net. Peoples mention a potential problem:
connection tracking may exhaust a lot of local resources.

Flávio Veloso Soares explains on page
https://gist.github.com/flaviovs/103a0dbf62c67ff371ff75fc62fdded3
how to avoid this locally with raw table rules but IMHO this makes
the life complicated. Also as mentioned by others elsewhere, that
routers between attacker and us may have also connection tables
that can be fulfilled.
(E.g. https://sysadminblog.net/2013/08/debian-iptables-tarpit/)

Maybe I found an elegant solution.

Instead of playing with NOTRACK, immediately after we sent the
ACK packet with zero window side, we should send an RST packet too,
but with _very low_ TTL, e.g. 5.

So the local kernel can forget the connection as usual and so do
the near (and potentially NATting) routers.
But the RST packet won't reach the attacker host. (Unless we got
friendly fire from the next room. In other words, the local IT
department can execute legitim port scans scot-free.)

The only drawback I can see, that a router answers our RST with
an ICMP Time Exceeded packet.

What is your opinion? Is this technically possible? (I am not
an experienced kernel developer.)

Cheers

Gabor

Reply via email to