Date: Wed, 26 Jul 2000 00:29:05 -0600 From: Wes Peters <wes@softweyr.com> To: Tim Yardley <yardley@uiuc.edu> Cc: Don Lewis <Don.Lewis@tsc.tdk.com>, Maksimov Maksim <maksim@tts.tomsk.su>, freebsd-security@FreeBSD.ORG Subject: Re: How defend from stream2.c attack? Message-ID: <397E8531.AE1DF9F@softweyr.com> References: <000401bfdb64$3eae8320$0c3214d4@dragonland.tts.tomsk.su> <000401bfdb64$3eae8320$0c3214d4@dragonland.tts.tomsk.su> <4.3.2.7.2.20000725181153.0218d700@students.uiuc.edu> <4.3.2.7.2.20000725223522.00b5dcc0@students.uiuc.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
Tim Yardley wrote:
>
> >With FreeBSD prior to 3.4/4.0 it didn't matter if you were attempting to
> >use multicast or not, a stream attack using random multicast source
> >addresses would turn your FreeBSD box into an attack reflector on every
> >attached interface. Urk!
>
> Correct. The blocking of multicast statement was meant for people that DO
> NOT use multicast. If you use multicast, then you cannot block it at the
> router. In otherwords, block * with multicast addresses. You could always
> just block tcp with multicast addresses, and that will not affect any real
> multicast traffic.
>
> >That no longer happens; the code now realizes that a TCP packet from a
> >multicast address is malformed and dumps it on the floor.
>
> Any sane stack would drop the multicast packets on the floor immediately if
> they are TCP packets. That is basically what the patch did. Since the
> notion of TCP multicast is not even possible, that is the correct thing to do.
But then again, that problem existing in the 4.2BSD stack and lived on
until a few months ago.
--
"Where am I, and what am I doing in this handbasket?"
Wes Peters Softweyr LLC
wes@softweyr.com http://softweyr.com/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?397E8531.AE1DF9F>
