Wireshark-users: [Wireshark-users] TCP Dup ACK
From: "Steven Ryder" <steve.ryder@xxxxxxxxxxx>
Date: Mon, 30 Mar 2009 14:16:21 -0700

Hello,

            I am new to the list and am hoping to appeal to the group for some assistance. I know this topic has been discussed here in the past but I was not able to resolve my issue with any ideas given in that thread (http://www.wireshark.org/lists/wireshark-users/200706/msg00013.html)

 

From time to time, we notice that our websites appear to be hit by a DOS attack. At that time, a packet capture reveals many thousands of TCP Dup ACK packets (~28K in 67 seconds).

 

Based on what I understand, these packets might actually be a symptom of a DOS attack and not the cause of it. A Dup ACK packet would be a normal response of a Client that has already sent an ACK but did not get a reply from a Server (because, as one example, it’s being DOS’d).  

 

So I am wondering if:

1)       Does this sound like a symptom of a DOS and not the cause of it? I believe it’s a symptom.

2)       If not, what would cause so many Dup ACKs? Could this be an attack vector itself?

 

Thank you,

-Steve

 

 

Packet

1          0.000000           165.139.171.135            ********************           TCP                                          40120 > http [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=0

 

57399   66.939348         165.139.171.135            ********************           TCP      [TCP Dup ACK 1#28699] 40120 > http [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=0

57400   66.939358         165.139.171.135            172.30.64.174                TCP      [TCP Dup ACK 2#28699] 40120 > http [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=0

57401   66.943632         165.139.171.135            *******************            TCP      [TCP Dup ACK 1#28700] 40120 > http [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=0

57402   66.943643         165.139.171.135            172.30.64.174                TCP      [TCP Dup ACK 2#28700] 40120 > http [PSH, ACK] Seq=1 Ack=1 Win=65535 Len=0