[pox-dev] Install dropping rule
Silvia Fichera
fichera.sil at gmail.com
Tue Dec 3 02:28:35 PST 2013
Hi all,
I'm trying to implement a syn flood protection, so, if the controller
receives a syn without ack consider the source a suspect source and I add
its mac address, dst mac addr and dst TCP port in a grey list. After
receiving a certain numer of syn packet (a threshold) without ack response
I wanna drop the incoming syn traffic from the "attacker" identifing it by
its mac address.
I've installed the dropping rule leaving the actions list empty in this way:
actions=[]
match=of.ofp_match.from_packet(packet,inport)
match.dl_src=SRCmac
match.tp_src=None
match.nw_src=None
#match.tp_dst=None
msg=of.ofp_flow_mod(command=of.OFPFC_ADD,
idle_timeout=FLOW_IDLE_TIMEOUT,
hard_timeout=of.OFP_FLOW_PERMANENT,
buffer_id=event.ofp.buffer_id,
actions=actions,match=match)
event.connection.send(msg.pack())
print("Dropping Rule installed")
but if the attacker performs ip spoofing and send a syn packet with the new
IP my controller install again the rule, also if the srcIP is wildcarded.
There are any wrong matching?
P.S.:
When the controller receives syn packet, if numer of syn <threshold, it
pretends to be the destination host and sent the syn ack packet.
If it receives the ack sends a reset, add the src ip in a whitelist and
install the forwarding rule.
Thanks for your help.
--
Silvia Fichera
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.noxrepo.org/pipermail/pox-dev-noxrepo.org/attachments/20131203/f5948452/attachment.htm>
More information about the pox-dev
mailing list