Date: Tue, 25 Jul 2000 23:33:47 -0600 From: Wes Peters <wes@softweyr.com> To: Tim Yardley <yardley@uiuc.edu> Cc: Don Lewis <Don.Lewis@tsc.tdk.com>, Maksimov Maksim <maksim@tts.tomsk.su>, freebsd-security@FreeBSD.ORG Subject: Re: How defend from stream2.c attack? Message-ID: <397E783B.ADB8162A@softweyr.com> References: <000401bfdb64$3eae8320$0c3214d4@dragonland.tts.tomsk.su> <000401bfdb64$3eae8320$0c3214d4@dragonland.tts.tomsk.su> <4.3.2.7.2.20000725181153.0218d700@students.uiuc.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
Tim Yardley wrote: > > >I would recommend adding packet filter rules that block incoming packets > >with IP broadcast addresses, both 255.255.255.255, and the broadcast > >address(es) of your local network(s). > > And block multicast if you arent using it in your lan. Keep in mind that > some switchs that are not multicast aware will treat the packets as > broadcasts and create a storm. Very bad. With FreeBSD prior to 3.4/4.0 it didn't matter if you were attempting to use multicast or not, a stream attack using random multicast source addresses would turn your FreeBSD box into an attack reflector on every attached interface. Urk! That no longer happens; the code now realizes that a TCP packet from a multicast address is malformed and dumps it on the floor. -- "Where am I, and what am I doing in this handbasket?" Wes Peters Softweyr LLC wes@softweyr.com http://softweyr.com/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?397E783B.ADB8162A>