Home
Windows Registry Tweaks
Index Page
Hardware
Disk Drives
Mice and Keyboards
Modems and Communications
Printers and Plotters
Processor and Motherboard
Video and Graphics
Network
Clients
Internet and Remote Access
Protocols
TCP/IP
WINS
Servers
Security
Active Desktop
Control Panel
Display
Network
Passwords
Printers
System
Desktop and Explorer
Login and Authentication
Network
Privacy
Remote Access
Start Menu and Taskbar
Documents and Folders
System
Software
Internet Explorer
Appearance
Network and Connections
Search Features
Security
Media Player
Microsoft Office
Outlook
Netmeeting
Outlook Express
pcAnywhere
Windows CE
Windows Messenger
Tips and Tricks
Configuration Files
AUTOEXEC.BAT
BOOT.INI
CONFIG.SYS
MSDOS.SYS
SYSTEM.INI
Customization
Keyboard Shortcuts
Windows
Accessories
Command Processor
Dr Watson
Registry Editor
Task Scheduler
Windows Installer
Appearance and Display
Icons and Fonts
Menus And Windows
Desktop
Explorer
File System
Caching and Memory
Files and Shortcuts
Maintenance
Login and Authentication
Start Menu and Taskbar
Documents and Folders
Taskbar
Startup and Shutdown
System
Scripts
Services
Windows File Checker
Troubleshooting
Crash Control
Logging
Repair
Registry FAQ
Dreamage
Book List
Downloads
Support Forums
Newsletter
Download Updates
Subscribe
Registry Guide for Windows Registry Guide for Windows
Part of the Dreamage Network
Dreamage Network and Software
Registry tweaks, tricks & hacks to optimize, enhance and secure Microsoft Windows.

Harden the TCP/IP Stack for Denial of Service Attacks (Windows 2000/XP)
Category: Home > Security > Network

Download this tweak with Tweak Manager!This tweak can be easily applied using Dreamage Tweak Manager.
Download a free trial now!

Denial of service attacks are network attacks that are aimed at making a computer or a particular service unavailable to network users. These settings can be used to increase the ability for Windows to defend against these attacks when connected directly to the Internet.

Open your registry and find the key below.

Create the following DWORD values and set them according to the table below.

  • EnableDeadGWDetect = "0" (default = 1)
    Disables dead-gateway detection as an attack could force the server to switch gateways.
  • EnableICMPRedirect = "0" (default = 1)
    Stops Windows from altering its route table in response to ICMP redirect messages. Some documentation has this listed as "EnableICMPRedirects" but according to Microsoft it should be "EnableICMPRedirect" no "s".
  • EnablePMTUDiscovery = "0" (default = 1)
    Disables maximum transmission unit (MTU) discovery as an attacker could force the MTU value to a very small value and overwork the stack.
  • KeepAliveTime = "300,000" (default = 7,200,000)
    Reduces how often TCP attempts to verify that an idle connection is still intact by sending a keep-alive packet.
  • NoNameReleaseOnDemand = "1" (default = 0)
    Protects the computer against malicious NetBIOS name-release attacks.
  • PerformRouterDiscovery = "0" (default = 1)
    Disables ICMP Router Discovery Protocol (IRDP) where an an attacker may remotely add default route entries on a remote system.
  • SynAttackProtect = "2" (default = 0)
    Automatically adds additional delays to connection indications, and TCP connection requests quickly timeout when a SYN attack is in progress.
Restart Windows for the changes to take effect.

Note: These values will not give the best performance due to additional checking and less optimization, but they will provide greater protection against attacks.

Registry Editor Example
|NameTypeData|
|(Default)REG_SZ(value not set)|
|EnableDeadGWDetectREG_DWORD0x00000000 (0)|
|EnableICMPRedirectREG_DWORD0x00000000 (0)|
|EnablePMTUDiscoveryREG_DWORD0x00000000 (0)|
|KeepAliveTimeREG_DWORD0x000493e0 (300000)|
|NoNameReleaseOnDemandREG_DWORD0x00000001 (1)|
|PerformRouterDiscoveryREG_DWORD0x00000000 (0)|
|SynAttackProtectREG_DWORD0x00000002 (2)|
-
|HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters|
-

Settings:
System Key: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters]
Name: EnableDeadGWDetect, EnableICMPRedirect, EnablePMTUDiscovery, KeepAliveTime, NoNameReleaseOnDemand, PerformRouterDiscovery, SynAttackProtect
Type: REG_DWORD (DWORD Value)

Disclaimer: Modifying the registry can cause serious problems that may require you to reinstall your operating system. We cannot guarantee that problems resulting from modifications to the registry can be solved. Use the information provided at your own risk.

Last Modified: December 19, 2002

 Return to Index Copyright © 1998-2003. All Rights Reserved.  License