Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 02 May 2014 11:16:51 -0400
From:      Lowell Gilbert <freebsd-security-local@be-well.ilk.org>
To:        "Ronald F. Guilmette" <rfg@tristatelogic.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-14:08.tcp
Message-ID:  <44d2fwcisc.fsf@be-well.ilk.org>
In-Reply-To: <96385.1398973109@server1.tristatelogic.com> (Ronald F. Guilmette's message of "Thu, 01 May 2014 12:38:29 -0700")
References:  <96385.1398973109@server1.tristatelogic.com>

index | next in thread | previous in thread | raw e-mail

"Ronald F. Guilmette" <rfg@tristatelogic.com> writes:

> I also have a question....
>
> If one manages a system where (a) all local user accounts are completely
> and 100% trustworthy and where (b) one has in place ipfw rules which reject
> all incoming packet *fragments* on all outward-facing interfaces, then is
> this security problem (relating to the reassembly queue) an issue at all
> for said system?  Or is it rather a non-event in such contexts?

That should keep you safe, but it will break some legitimate
connections, not to mention MTU discovery.


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44d2fwcisc.fsf>