Steadybit logoReliability Hub
GitHubGitHub iconStart Free Trial
Steadybit logoReliability Hub

Reset TCP Connection

AttackAttack
Injects TCP resets for matching connections (incoming and outgoing)
Targets:
Linux Hosts
Install now

Reset TCP Connection

Injects TCP resets for matching connections (incoming and outgoing)
AttackAttack
Targets:
Linux Hosts
Install now

Reset TCP Connection

AttackAttack
Injects TCP resets for matching connections (incoming and outgoing)
Targets:
Linux Hosts
Install now

Reset TCP Connection

Injects TCP resets for matching connections (incoming and outgoing)
AttackAttack
Targets:
Linux Hosts
Install now
Go back to list

Introduction

Actively terminates matching TCP connections on the host by sending TCP RST responses. Unlike "Block Traffic", which silently drops packets causing timeouts, this attack causes immediate connection errors on the client side.

Prerequisites

If you are not using our container images for the extension, the attack requires iptables (from the iptables package).

Details

The attack uses iptables REJECT rules with --reject-with tcp-reset to send TCP RST packets for matching connections. This affects both incoming and outgoing TCP traffic. The iptables rules are inserted at the top of the host's filter chains to ensure they are evaluated before any existing rules (e.g., Kubernetes kube-proxy rules). Each attack instance creates a unique iptables chain, allowing multiple concurrent attacks with different filters on the same target.

Only TCP traffic is affected. UDP and other protocols are not impacted by this attack.

Use Cases

  • Simulate abrupt connection resets from upstream or downstream services
  • Test client-side retry and reconnection logic under immediate connection failures
  • Verify circuit breaker behavior when connections are actively refused rather than timing out
  • Simulate firewall or load balancer dropping connections with RST

Parameters

ParameterDescriptionDefault
DurationHow long should TCP connections be reset?30s
HostnameRestrict to/from which hosts the traffic is affected
IP AddressRestrict to/from which IP addresses the traffic is affected
PortsRestrict to/from which ports the traffic is affected
Network InterfaceTarget network interface to affect. All non-loopback if none specified

More Linux Host Actions

See all
Block DNS
Blocks access to DNS servers
AttackAttack
Linux Hosts
Start Using Steadybit Today

Get started with Steadybit, and you’ll get access to all of our features to discover the full power of Steadybit. Available for SaaS and on-prem!

Are you unsure where to begin?

No worries, our reliability experts are here to help: book a demo with them!

Statistics
-Stars
Tags
Host
Kubernetes
Network
AWS
Azure
GCP
Homepage
hub.steadybit.com/extension/com.steadybit.extension_host
License
MIT
MaintainerSteadybit
Install now
Steadybit logoReliability Hub
Start Free Trial
© 2026 Steadybit GmbH. All rights reserved.
Twitter iconLinkedIn iconGitHub icon