Mike Duvos wrote:
Igor writes:
[C program which allegedly does a DoS attack on a server]
I thought the correct way to do this was to spew packets with random return addresses and fill up the host's listen table with half open TCP connections waiting to time out.
There are patches that protect against this. The DOS attack that you mention has been beaten to death in BugTraq and other places. It worked great until all major OSes were patched. (of course some backwards sites still run unpatched OSes) It is very hard to protect against my attack, because it can only be done at the application level. xinetd _may_ be helpful, though, if the service being attacked is started from [x]inetd.
Opening 1,000 genuine TCP connections to a host wastes both the host's resources as well as yours, and is a tad obvious should your target log packets with your IP address in them.
Yes, BUT most typically a new connection creates only a new file descriptor on the host, and a whole new process on the target host. - Igor.