Re: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fw

看板FB_security作者時間22年前 (2004/04/22 03:30), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串5/23 (看更多)
On 21 Apr, Mike Silbersack wrote: > > On Tue, 20 Apr 2004, Don Lewis wrote: > >> I am concerned that step C will not solve the compatibility problem. The >> FreeBSD host is sending a FIN to close an established connection, and >> the peer host adding the window size advertised in the FIN packet to the >> sequence number acknowledged in the FIN packet, and using the sum as the >> sequence number for the RST packet, which puts the sequence number at >> the end of the receive window. > > Would it be feasible for us to create a four to five element array to > track "resettable" sequence numbers? This could hold the sequence numbers > of the last few packets transmitted, and account for that edge case as > well. I'm very uneasy with the IETF step C - sending more packets out > into the network sounds like a new type of amplification attack. I'd be concerned about the extra memory, especially in cases where we want to support very large numbers of connections. As far as amplification, step C has a gain of less than one, since packets are only transmitted if the incoming packet hits the window, and they will be the same or smaller in size than the incoming packets. I don't know if it would be valid to rate limit them ... If this is the only edge case that we have to worry about, we might be able change the test to: if (th->th_seq == tp->last_ack_sent || th->th_seq == tp->last_ack_sent + tp->rcv_wnd - 1) { _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #10XilW00 (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 5 之 23 篇):
文章代碼(AID): #10XilW00 (FB_security)