Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 17 Oct 2002 04:52:33 -0700
From:      David Schultz <dschultz@uclink.Berkeley.EDU>
To:        Mike Hoskins <mike@adept.org>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: CERT VU#539363
Message-ID:  <20021017115233.GA10789@HAL9000.homeunix.com>
In-Reply-To: <20021017003422.V5273-100000@fubar.adept.org>
References:  <20021017004315.GA8951@HAL9000.homeunix.com> <20021017003422.V5273-100000@fubar.adept.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Thus spake Mike Hoskins <mike@adept.org>:
> > I believe that's the idea.  IPFW doesn't do this; it simply stops
> > creating new dynamic rules when the table is full.  I think
> > there's lots of room for DOS resistance here; you could imagine
> > separate per-rule or per-source quotas on dynamic rules, for
> > example.
> 
> I noticed a lot of big names haven't replied (Cisco).  I'd like to know
> how the PIX' "adaptive security" algorithms handle this - a first clue
> will be seeing their response.
> 
> > If you turn off statefulness, you lose some expressiveness, and
> > you may consequently allow or restrict more than you intended to.
> 
> Indeed, I never intended to suggest configuring a "static" firewall as a
> valid option for most stateful installations.  I believe that was an
> intended reccomendation from CERT, however, in their typically vague and
> overly broad manner.  ;)

I just read the latter advisory you referred to.  It appears to be
based on the paper by Stephen Gill that it cites, and the author
of the advisory doesn't seem to realize that the described
vulnerabilities aren't new or recently discovered.  The general
problem with maintaining state is well-known, and the specific
attack of desynchronizing the connection state between an internal
host and the firewall is described in [1], along with several
variants.  That said, I still find the problem of intelligently
managing firewall state very interesting.

(By the way, the Gill paper cited at the bottom of the advisory
mentions PIX.  You mentioned you were interested in that, so you
might want to take a look.)


[1]  Paxson, V.  Bro: A System for Detecting Network Intruders in
     Real-Time.  Berkeley, 1999.  ftp://ftp.ee.lbl.gov/papers/bro-CN99.ps.gz

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20021017115233.GA10789>