FreeBSD 8.2-STABLE sending FIN no ACK packets. kern/168842

Andre Oppermann andre at freebsd.org
Wed Jun 13 13:20:02 UTC 2012


On 08.06.2012 14:43, Nikolay Denev wrote:
>
> On Jun 8, 2012, at 4:30 AM, Adrian Chadd wrote:
>
>> On 7 June 2012 05:41, Nikolay Denev<ndenev at gmail.com>  wrote:
>>> Hello,
>>>
>>> I've been pointed out by our partner that we are sending TCP packets with FIN flag and no ACK set, which is triggering
>>> alerts on their firewalls.
>>> I've investigated, and it appears that some of our FreeBSD hosts are really sending such packets. (they are running some java applications)
>>> I did "tcpdump -s0 -vni em1 '(tcp[tcpflags]&  tcp-ack == 0)&&  (tcp[tcpflags]&  tcp-fin != 0)'" to catch them.
>>>
>>> Is this considered normal?
>>> It seems at least Juniper considers this malicious traffic : http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig-security/id-72577.html
>>
>> Would you please file a PR with this, so it doesn't get lost?
>>
>> Thanks,
>>
>>
>> Adrian
>
> Filed as kern/168842, and mistakenly duplicated as kern/168843 (the latter can be closed).
>
> As I wrote in the PR, I have a PCAP that I can privately share if someone is interested.

Hi Nikolay

please make the pcap available to me.  From the tcpdump in the PR I can't
analyze how this stray packet may come about.

While certainly a bug it is not a security issue as any compliant tcp stack
would drop such a packet on receipt.

-- 
Andre


More information about the freebsd-net mailing list