Date: Sun, 9 Mar 2003 17:26:37 -0800 From: "Crist J. Clark" <crist.clark@attbi.com> To: Sean Chittenden <sean@chittenden.org> Cc: freebsd-ipfw@freebsd.org Subject: Re: ACK+RST useful? Message-ID: <20030310012637.GB88267@blossom.cjclark.org> In-Reply-To: <20030303045138.GQ79234@perrin.int.nxad.com>
index | next in thread | previous in thread | raw e-mail
On Sun, Mar 02, 2003 at 08:51:38PM -0800, Sean Chittenden wrote:
> I'm confused as to what the point of having a packet with the RST and
> ACK flags set. In legitimate use, an RST+ACK packet is only sent
> after the connection has been closed.
Nope, you are missing the most obvious circumstances that give rise to
RST|ACK, a SYN-only packet sent to a closed port.
A RST|ACK packet is sent whenever the the RST segment is a response to
a segment that had no ACK field.
> With stateful firewalls, this
> can cause a great deal of logging of packets that are legit and apart
> of the spec, but are by and large worthless as far as I can tell.
> I've read through RFC 793 and as best as I can tell and with a
> stateful firewall, it strikes me as being _okay_ to have a drop rule
> (following the check-state rule) for packets that have the RST+ACK
> bits set. Am I wrong or missing something with this assertion? -sc
Probably not a good idea. When you try to open a connection to a close
port, rather than immediately fail when the RST is received, you'll
need to wait for the timeout.
--
Crist J. Clark | cjclark@alum.mit.edu
| cjclark@jhu.edu
http://people.freebsd.org/~cjc/ | cjc@freebsd.org
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ipfw" in the body of the message
help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20030310012637.GB88267>
