Hello,
I
am new to the list and am hoping to appeal to the group for some assistance. I
know this topic has been discussed here in the past but I was not able to
resolve my issue with any ideas given in that thread (http://www.wireshark.org/lists/wireshark-users/200706/msg00013.html)
From time to time, we notice that our websites appear to be
hit by a DOS attack. At that time, a packet capture reveals many thousands of
TCP Dup ACK packets (~28K in 67 seconds).
Based on what I understand, these packets might actually be
a symptom of a DOS attack and not the cause of it. A Dup ACK packet would be a
normal response of a Client that has already sent an ACK but did not get a
reply from a Server (because, as one example, it’s being DOS’d).
So I am wondering if:
1) Does this
sound like a symptom of a DOS and not the cause of it? I believe it’s a
symptom.
2) If not, what
would cause so many Dup ACKs? Could this be an attack vector itself?
Thank you,
-Steve
Packet
1 0.000000 165.139.171.135 ******************** TCP 40120
> http [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=0
57399 66.939348 165.139.171.135 ******************** TCP [TCP
Dup ACK 1#28699] 40120 > http [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=0
57400 66.939358 165.139.171.135 172.30.64.174 TCP [TCP
Dup ACK 2#28699] 40120 > http [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=0
57401 66.943632 165.139.171.135 ******************* TCP [TCP
Dup ACK 1#28700] 40120 > http [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=0
57402 66.943643 165.139.171.135 172.30.64.174 TCP [TCP
Dup ACK 2#28700] 40120 > http [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=0