Re: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fw

看板FB_security作者時間22年前 (2004/04/24 02:43), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串19/23 (看更多)
On 23 Apr, Mike Silbersack wrote: > > On Thu, 22 Apr 2004, jayanth wrote: > >> if i remember right this was done to handle the Alteons which >> generate a RST segment that would fall within the window size but not the >> next expected sequence no. >> So they would do something crazy like rcv_nxt + rcv_win as the sequence no, >> for the RST segment rather than rcv_nxt + 1. >> This was part of the RFC though. >> >> If it is a problem we can always revert it back. >> >> jayanth > > What type of packet was causing the Alteons to emit the RST? SYN, FIN, > normal data? > > Also, has Alteon fixed the problem or do their load balancers still > exhibit the behavior? The link I posted showed it was a FIN, and after the RST was sent (and ignored by the FreeBSD stack because of the strict sequence number check), the Alteon (or whatever it was) did not respond to the retransmissions of the FIN packet. Maybe we can get by with the strict check by default and add a sysctl to revert to the permissive check. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #10YMEt00 (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 19 之 23 篇):
文章代碼(AID): #10YMEt00 (FB_security)