TCP vulnerability

Alan Evans evans.alan at sbcglobal.net
Sat Apr 24 08:43:28 PDT 2004


I agree, but what's most important is to maintain
backward compatibility. If one breaks it, it's a DoS
is some sense. I also saw some postings on NetBSD
which does ratelimiting of ACKs (in response to SYNs),
and ACKs RST. IMHO, the latter is bogus - why ACK a
RST? And, the former may impose an artificial limit
of some sort.

Alan Evans

--- Andre Oppermann <andre at freebsd.org> wrote:
> Chuck Swiger wrote:
> > 
> > Alan Evans wrote:
> > > I'm sure FreeBSD is vulnerable.
> > >
> > >
> http://www.us-cert.gov/cas/techalerts/TA04-111A.html
> > >
> > > There's a draft that (sort of) addresses this.
> Should
> > > we adopt it?
> > 
> > This issue is being discussed on freebsd-security
> now, and Mike Silbersack
> > <silby at silby.com> has some patches available for
> review and testing.
> 
> There has been an additional problem in some BSD
> stacks with RST's
> which has been fixed in FreeBSD about six years ago.
>  The remaining
> things which are addressed in that paper are
> hardening measures to
> reduce the chances of a brute force blind attack. 
> There *no* vulner-
> ablility in the sense of "send packet x" and
> everything breaks.
> 
> -- 
> Andre


More information about the freebsd-net mailing list