From owner-freebsd-net@FreeBSD.ORG Sat Apr 24 08:22:42 2004 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 01A5B16A4CE for ; Sat, 24 Apr 2004 08:22:42 -0700 (PDT) Received: from mailtoaster1.pipeline.ch (mailtoaster1.pipeline.ch [62.48.0.70]) by mx1.FreeBSD.org (Postfix) with ESMTP id 047E343D5E for ; Sat, 24 Apr 2004 08:22:40 -0700 (PDT) (envelope-from andre@freebsd.org) Received: (qmail 14491 invoked from network); 24 Apr 2004 15:22:38 -0000 Received: from unknown (HELO freebsd.org) ([62.48.0.54]) (envelope-sender ) by mailtoaster1.pipeline.ch (qmail-ldap-1.03) with SMTP for ; 24 Apr 2004 15:22:38 -0000 Message-ID: <408A863E.B6E60792@freebsd.org> Date: Sat, 24 Apr 2004 17:22:38 +0200 From: Andre Oppermann X-Mailer: Mozilla 4.76 [en] (Windows NT 5.0; U) X-Accept-Language: en MIME-Version: 1.0 To: Chuck Swiger References: <20040424144535.81824.qmail@web80106.mail.yahoo.com> <408A8127.6010908@mac.com> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit cc: Alan Evans cc: net@freebsd.org Subject: Re: TCP vulnerability X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 24 Apr 2004 15:22:42 -0000 Chuck Swiger wrote: > > Alan Evans wrote: > > I'm sure FreeBSD is vulnerable. > > > > http://www.us-cert.gov/cas/techalerts/TA04-111A.html > > > > There's a draft that (sort of) addresses this. Should > > we adopt it? > > This issue is being discussed on freebsd-security now, and Mike Silbersack > has some patches available for review and testing. There has been an additional problem in some BSD stacks with RST's which has been fixed in FreeBSD about six years ago. The remaining things which are addressed in that paper are hardening measures to reduce the chances of a brute force blind attack. There *no* vulner- ablility in the sense of "send packet x" and everything breaks. -- Andre