Feature Description
Overview
A distributed denial-of-service (DDoS) attack is caused when multiple malicious systems flood the targeted system with messages in the intention of exhausting the memory of the targeted system. This causes the affected system to run out of sufficient resources to service requests from legitimate peers. Attackers targeting a system can employ any of the following methods:
-
Send large amounts of IKE_SA_INIT messages (but no IKE_Auth) for which half-open IKE SA structures are created. This causes the system to utilize resources and run out of memory.
-
Send a large amount of junk IKE_Auth packets with correct SPI_i and SPI_r. This causes the system to run out of memory while trying to decrypt the packets.
-
Provide an illegitimate URL with a certificate of large size.
-
Send continuous SA_INIT packets. This causes the system to run out of memory while trying to generate keys for encrypted packets.
-
Send large amounts of rekey requests per second.
-
Send large amounts of messages with distinct message IDs. This causes the system to queue all incoming IKE messages, and run out of memory.
This feature provides mechanisms to defend against the DDoS attacks outlined above.