11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

How To: Harden the TCP/IP Stack 761Use the values summarized in Table 4 for maximum protection.Table 4 Recommended ValuesValue NameValue (REG_DWORD)EnableDynamicBacklog 1MinimumDynamicBacklog 20MaximumDynamicBacklog 20000DynamicBacklogGrowthDelta 10Additional ProtectionsAll of the keys <strong>and</strong> values in this section are located under the registry keyHKLM\System\CurrentControlSet\Services\Tcpip\Parameters.Protect Screened Network DetailsNetwork Address Translation (NAT) is used to screen a network from incomingconnections. An attacker can circumvent this screen to determine the networktopology using IP source routing.Value: DisableIPSourceRoutingRecommended value data: 1Valid values: 0 (forward all packets), 1 (do not forward Source Routed packets),2 (drop all incoming source routed packets).Description: Disables IP source routing, which allows a sender to determine the routea datagram should take through the network.Avoid Accepting Fragmented PacketsProcessing fragmented packets can be expensive. Although it is rare for a denial ofservice to originate from within the perimeter network, this setting prevents theprocessing of fragmented packets.Value: EnableFragmentCheckingRecommended value data: 1Valid values: 0 (disabled), 1 (enabled)Description: Prevents the IP stack from accepting fragmented packets.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!