Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 20 Apr 2004 20:46:44 -0700 (PDT)
From:      Don Lewis <truckman@FreeBSD.org>
To:        avalon@caligula.anu.edu.au
Cc:        freebsd-security@FreeBSD.org
Subject:   Re: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fwd)
Message-ID:  <200404210346.i3L3ki7E045504@gw.catspoiler.org>
In-Reply-To: <200404210311.i3L3Bt7E045458@gw.catspoiler.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 20 Apr, Don Lewis wrote:
> On 21 Apr, Darren Reed wrote:

>>> http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcpsecure-00.txt
> 
> I saw this draft earlier today.
> 
>    RFC793 [1] currently requires handling of a segment with the RST bit
>    when in a synchronized state to be processed as follows:
>    1) If the RST bit is set and the sequence number is outside the
>       expected window, silently drop the segment.
>    2) If the RST bit is set and the sequence number is acceptable i.e.:
>       (RCV.NXT <= SEG.SEQ <= RCV.NXT+RCV.WND) then reset the connection.
> 
> 
>    Instead, the following changes should be made to provide some
>    protection against such an attack.
>    A) If the RST bit is set and the sequence number is outside the
>       expected window, silently drop the segment.
>    B) If the RST bit is exactly the next expected sequence number, reset
>       the connection.
>    C) If the RST bit is set and the sequence number does not exactly
>       match the next expected sequence value, yet is within the
>       acceptable window (RCV.NXT < SEG.SEQ <= RCV.NXT+RCV.WND) send an
>       acknowledgment.
> 
> 
> Our original implementation of the RST sequence number checking was much
> more permissive than RFC 793.  I submitted a patch, which was included
> in tcp_input.c version 1.81 that implemented steps A and B above.  It
> was discovered that this is incompatible with certain peers, so the code
> was changed to match RFC 793 in tcp_input.c 1.98.
> 
> I don't know if adding step C will fix the problem.  There may further
> info in the list archives.

>From what I see here: 
	<http://docs.freebsd.org/cgi/getmsg.cgi?fetch=71731+0+archive/1999/freebsd-net/19991128.freebsd-net>;
I am concerned that step C will not solve the compatibility problem. The
FreeBSD host is sending a FIN to close an established connection, and
the peer host adding the window size advertised in the FIN packet to the
sequence number acknowledged in the FIN packet, and using the sum as the
sequence number for the RST packet, which puts the sequence number at
the end of the receive window.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200404210346.i3L3ki7E045504>