Hello, I'm Nizar, an experienced Linux system administrator with strong analytical skills

Analyze SYN Flood by Using Netstat


What is SYN flood ?

A SYN flood (half-open attack) is a denyal-of-service (DDoS) attack which exploits the way of TCP 3-Way Handshake by repeteadly sending initial connection request (SYN) packets then overhelm all available ports on the targeted server. It can also cause SYN backlog at Linux to be full which can cause memory to be full too.

Because we will discuss backlog at netstat, we need to discuss SYN and Accept Queue at Linux.

SYN and Accept Queue

SYN and Accept Queue

SYN Queue is used to store inbound SYN packets. It is also responsible to send SYN+ACK and resend when timeout. After transmitting SYN+ACK to client, SYN Queue waits for an ACK from the client. The received ACK should match against the fully established connection table. After SYN Queue match, the kernel removes the item from SYN Queue then create full fledged connection and adds it to the Accept Queue. [1]

About SYN+ACK resend when timeout, it's number is regulated by net.ipv4.tcp_synack_retries. Based on the description of tcp_syn_ack_retries:

tcp_synack_retries = INTEGER Number of times SYNACKs for a passive TCP connection attempt will be retransmitted. Should not be higher than 255. Default value is 5, which corresponds to 31 seconds till the last retransmission with the current initial RTO of 1second. With this the final timeout for a passive TCP connection will happen after 63 seconds.

net.ipv4.tcp_synack_retries have default 5 retries after when there is timeout after sending SYN+ACK.

Accept Queue is used to store fully established connections. When a process calls accept(), the sockets are de-queued and passed to the application. [1]

The SYN Queue cap can be configured by changing the kernel variable net.ipv4.tcp_max_syn_backlog. Nowadays net.core.somaxconn caps both SYN Queue and Accept Queue.

SYN Flood

SYN Flood

At Linux System Level, SYN Flood attack will cause SYN Queue to be full which can cause all TCP packets to be denied. Because each slot in SYN Queue use some memory, which is 256 bytes of memory in kernel 4.14, so it can cause memory to be fully occupied.

There is some mitigation that can be done at kernel variable, which are:

  • net.ipv4.tcp_syncookies

    This is used to prevent against the common SYN flood attack. It is used to send out syncookies when syn backlog queue is full because SYN Flood attack. Default value is 1.

  • net.ipv4.tcp_max_syn_backlog

    Maximal number of remembered connection requests, which have not received an acknowledgment from the client (SYN Queue). We can change this to a greater value if we see our backlog is full based on netstat.

  • net.core.somaxconn

    This is a caps for SYN Queue and Accept Queue. The condition for increasing this value is the same as net.ipv4.tcp_max_syn_backlog.

  • net.ipv4.tcp_synack_retries

    The number of SYN+ACK retries sended after timeout. We need to decrease this value to reduce too many SYN+ACK retries in the event of SYN Flood. Because there will be no ACK from the client, so there will be too many SYN received and SYN+ACK sended from SYN+ACK retries. If we reduce this value, we can reduce the load at our TCP socket.

Analyze SYN Flood from netstat

If we try to execute netstat -an, we will see this output:

    Active Internet connections (servers and established)
    Proto Recv-Q Send-Q Local Address           Foreign Address         State      
    tcp        0      0 0.0.0.0:7070            0.0.0.0:*               LISTEN     
    tcp        0      0 127.0.0.1:631           0.0.0.0:*               LISTEN     
    tcp        0      0 0.0.0.0:57621           0.0.0.0:*               LISTEN     
    tcp        0      0 0.0.0.0:34499           0.0.0.0:*               LISTEN     
    tcp        0      0 127.0.0.53:53           0.0.0.0:*               LISTEN    

We can see Send-Q in column three. So what is Send-Q ? Based on man of netstat, Send-Q is the count of bytes not acknowledged by the remote host. Since kernel 2.6.18, this column contains the maximum size of the SYN backlog. So it is basically the same as SYN backlog.

Then how can we use the value of Send-Q to decide if there is SYN flood?

First you need to know which port is attacked. As the attacked port in my real case is 443, so i need to filter port 443 from netstat.

You can analyze the Send-Q usage by using this command netstat -n | awk '$4 ~ ":443"' | awk '{print $3}' | sort | uniq -c | sort -nr.

This is the sample from my real case attack:

    netstat -n | awk '$4 ~ ":443"' | awk '{print $3}' | sort | uniq -c | sort -nr
        775 0
        194 1
        28 40
        22 64
        5 83689
        5 4486
        4 83690
        4 79165
        3 79161
        3 69300
        2 83688
        2 79166
        2 544
        2 333
        2 19131
        2 1229
        2 1228
        1 8480
        1 84243
        1 84242
        1 83692
        1 82024
        1 80646
        1 79716
        1 79714
        1 79167
        1 79163
        1 79160
        1 79159
        1 79158
        1 78240
        1 77918
        1 77917
        1 72850
        1 71196
        1 70478
        1 69852
        1 69298
        1 69297
        1 69191
        1 69148
        1 65803
        1 65545
        1 6527
        1 61890
        1 61790
        1 60343
        1 58864
        1 58724
        1 568
        1 5296
        1 5262
        1 50935
        1 48
        1 37130
        1 37126
        1 35933
        1 35
        1 34014
        1 27171
        1 25275
        1 24048
        1 23740
        1 21469
        1 21331
        1 21174
        1 19133
        1 17400
        1 1566
        1 15223
        1 126
        1 1235
        1 1233
        1 1230
        1 10029

As the output above shows, we can see quite many Send-Q with value higher than 1500 so we can regard all the request above is SYN flood.

If we want to block all the suspected IP, we can also use this script:

    domain=[ATTACKED_DOMAIN]
    checksynflood=$(netstat -n | awk '$4 ~ ":443"' | awk '{print $3,$5}' | sort | uniq -c | sort -k 2 -nr)
    if [[ $(echo -e "$checksynflood" | awk '$2 >= 1500' | wc -l) -ge 80 ]]
    then
        ip_attackers=$(tail -n 5000 /var/log/nginx/access.log | grep -E $(echo -e "$checksynflood" | head -n 100 | awk '{print $3}' | cut -d":" -f1 | grep -oP "^(\d{1,3}\.){3}\d{1,3}" | sed "s#^#^#g" |  tr "\n" "|" | sed "s#|\$##g") | grep $domain | awk '{print $1}' | sort -u | tr "\n" "," | sed "s#,\$##g")
        [ -n "$ip_attackers" ] && iptables -A INPUT -s $ip_attackers -p tcp -j REJECT
    fi

At the script above, i compare netstat result with access.log of nginx because i am using nginx. You can customize the script based on your need too.

That is all what i can share, i hope the knowledge from my real case can help you to understand how to analyze SYN flood attack by using netstat.

[1] Marek, M., "SYN Packet Handling in The Wild", CloudFlare, 2018,[Online]. Available: https://blog.cloudflare.com/syn-packet-handling-in-the-wild/

Date: December 16th at 1:24pm
Author: Nizar Akbar M
Tags: DDoS

NEXT