Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 Nov 1997 12:50:06 +1100
From:      Darren Reed <avalon@coombs.anu.edu.au>
Message-ID:  <199711230150.RAA10118@hub.freebsd.org>

next in thread | raw e-mail | index | archive | help
>From owner-bugtraq@NETSPACE.ORG Sun Nov 23 10:52:48 EDT 1997 remote from cheops
Received: from brimstone.netspace.org by postbox.anu.edu.au with ESMTP
	(1.37.109.16/16.2) id AA065112764; Sun, 23 Nov 1997 10:52:44 +1100
Received: from unknown@netspace.org (port 19009 [128.148.157.6]) by brimstone.netspace.org with ESMTP id <97815-18069>; Sat, 22 Nov 1997 18:01:59 -0500
Received: from NETSPACE.ORG by NETSPACE.ORG (LISTSERV-TCP/IP release 1.8c) with
          spool id 5806752 for BUGTRAQ@NETSPACE.ORG; Sat, 22 Nov 1997 17:57:38
          -0500
Received: from brimstone.netspace.org (brimstone.netspace.org
          [128.148.157.143]) by netspace.org (8.8.7/8.8.2) with ESMTP id
          RAA30774 for <BUGTRAQ@NETSPACE.ORG>; Sat, 22 Nov 1997 17:46:32 -0500
Received: from unknown@netspace.org (port 19009 [128.148.157.6]) by
          brimstone.netspace.org with ESMTP id <97470-15165>; Sat, 22 Nov 1997
          17:46:08 -0500
Approved-By: aleph1@UNDERGROUND.ORG
Received: from bikini.ai.mit.edu (bikini.ai.mit.edu [128.52.32.254]) by
          netspace.org (8.8.7/8.8.2) with ESMTP id OAA24040 for
          <BUGTRAQ@NETSPACE.ORG>; Sat, 22 Nov 1997 14:43:09 -0500
Received: (from mycroft@localhost) by bikini.ai.mit.edu (8.8.7/8.8.6) id
          OAA08548; Sat, 22 Nov 1997 14:47:21 -0500 (EST)
References: <Pine.SUN.3.94.971120151852.17245C-100000@dfw.dfw.net>
            <el24t54n3dc.fsf@bikini.ai.mit.edu>
Lines: 25
X-Mailer: Gnus v5.3/Emacs 19.34
Message-Id: <el267pklnhz.fsf@bikini.ai.mit.edu>
Date: 	Sat, 22 Nov 1997 14:47:20 -0500
Reply-To: "Charles M. Hannum" <mycroft@MIT.EDU>
Sender: avalon
From: "Charles M. Hannum" <mycroft@MIT.EDU>
Subject:      Re: "LAND" Attack Update
X-To:         Aleph One <aleph1@DFW.NET>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  mycroft@mit.edu's message of 22 Nov 1997 14:19:11 -0500

mycroft@mit.edu (Charles M. Hannum) writes:

>
> 2) A socket in LISTEN state is not initiating a connection attempt, so
>    if it receives a SYN-only packet from itself, it *must* be a
>    forgery.  A self-connect would cause the socket to no longer be in
>    LISTEN state before the SYN-only packet arrives.  There's no point
>    in sending a RST in this case, since we'd just be sending it to
>    ourselves.
>
>    (Actually, this change isn't really complete; in theory, if the
>    LISTEN socket was bound to INADDR_ANY, then we should check whether
>    the source address of the SYN was any of our local addreses, not
>    just that it matches the destination.  However, a failure to detect
>    the attack at this point will merely generate an extra SYN+ACK that
>    will be dropped by the first change.)

BTW, on a related note...

The FreeBSD hack to `fix' (or not allow) self-connects DOES NOT WORK
FOR MULTIHOMED HOSTS.  It's still possible to crash a multihomed
FreeBSD system by locally running a program that connects a TCP socket
to itself.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199711230150.RAA10118>