11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How To: Harden the TCP/IP Stack 757Set SYN Protection ThresholdsThe following values determine the thresholds for which SYN protection is triggered.All of the keys <strong>and</strong> values in this section are under the registry keyHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services. These keys<strong>and</strong> values are:● Value name: TcpMaxPortsExhaustedRecommended value: 5Valid values: 0–65535Description: Specifies the threshold of TCP connection requests that must beexceeded before SYN flood protection is triggered.● Value name: TcpMaxHalfOpenRecommended value data: 500Valid values: 100–65535Description: When SynAttackProtect is enabled, this value specifies the thresholdof TCP connections in the SYN_RCVD state. When SynAttackProtect is exceeded,SYN flood protection is triggered.● Value name: TcpMaxHalfOpenRetriedRecommended value data: 400Valid values: 80–65535Description: When SynAttackProtect is enabled, this value specifies the thresholdof TCP connections in the SYN_RCVD state for which at least one retransmissionhas been sent. When SynAttackProtect is exceeded, SYN flood protection istriggered.Set Additional ProtectionsAll the keys <strong>and</strong> values in this section are located under the registry keyHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services. These keys<strong>and</strong> values are:● Value name: TcpMaxConnectResponseRetransmissionsRecommended value data: 2Valid values: 0–255Description: Controls how many times a SYN-ACK is retransmitted beforecanceling the attempt when responding to a SYN request.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!