27.11.2014 Views

z/VM: TCP/IP User's Guide - z/VM - IBM

z/VM: TCP/IP User's Guide - z/VM - IBM

z/VM: TCP/IP User's Guide - z/VM - IBM

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Summary of Changes<br />

This section describes the technical changes made in this edition of the book and in<br />

previous editions. For your convenience, the changes made in this edition are<br />

identified in the text by a vertical bar (|) in the left margin. This edition may also<br />

include minor corrections and editorial changes that are not identified.<br />

Second Edition for z/<strong>VM</strong> Version 4 (May 2002)<br />

This edition contains updates for the General Availability of <strong>TCP</strong>/<strong>IP</strong> Level 430.<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

|<br />

PASV FTP client support<br />

A new FTP PASSIVE subcommand has been added so that z/<strong>VM</strong> FTP clients<br />

outside of a firewall can transfer files to and from an FTP server that is inside of a<br />

firewall.<br />

<strong>TCP</strong>/<strong>IP</strong> Stack Vulnerability Reduction<br />

Function has been added to improve the performance and reliability of the <strong>TCP</strong>/<strong>IP</strong><br />

stack by preventing more Denial-of-Service (DoS) attacks. These attacks include:<br />

v<br />

v<br />

v<br />

v<br />

v<br />

v<br />

Kiss-of-Death (KOD) — an IGMP based attack that depletes the stack’s large<br />

envelopes<br />

KOX — a version of the KOD attack that also has source <strong>IP</strong> address spoofing<br />

Stream — an attack in which <strong>TCP</strong> packets are sent to the stack with no header<br />

flags set<br />

R4P3D — an augmented version of the Stream attack<br />

Blat — a version of the Land attack that also has the URG flag turned on in the<br />

<strong>TCP</strong> header and has the ability to incrementally spoof the source <strong>IP</strong> address<br />

SynFlood — an attack in which the initiator floods the <strong>TCP</strong>/<strong>IP</strong> stack with SYN<br />

packets that have spoofed source <strong>IP</strong> addresses, resulting in the server never<br />

receiving the final ACKs needed to complete the three-way handshake in the<br />

connection process.<br />

The Smurf DoS attack has also been updated to address three variants of the<br />

attack. Smurf is a DoS attack in which an ICMP Echo Request is sent to a<br />

broadcast or multicast address. The three variants are:<br />

v<br />

v<br />

v<br />

Smurf-IC — where ″IC″ denotes that incoming packets are using the <strong>TCP</strong>/<strong>IP</strong><br />

stack to launch an attack<br />

Smurf-OB — where ″OB″ denotes that an outbound ICMP Echo Request<br />

matched the description of a Smurf attack<br />

Smurf-RP — where ″RP″ denotes that ICMP Echo Reply packets being received<br />

by the stack do not match any Echo Requests that were sent.<br />

First Edition for z/<strong>VM</strong> Version 4 (October 2001)<br />

This edition contains updates for the General Availability of <strong>TCP</strong>/<strong>IP</strong> Level 420.<br />

<strong>TCP</strong>/<strong>IP</strong> Stack Performance and Reliability Improvements<br />

Function has been added to improve the performance and reliability of the <strong>TCP</strong>/<strong>IP</strong><br />

stack by preventing some Denial of Service (DOS) attacks. These attacks include:<br />

© Copyright <strong>IBM</strong> Corp. 1987, 2002 xiii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!