Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 7 Jun 2012 15:41:59 +0300
From:      Nikolay Denev <ndenev@gmail.com>
To:        freebsd-net <freebsd-net@freebsd.org>
Subject:   FreeBSD 8.2-STABLE sending FIN no ACK packets.
Message-ID:  <54EF0399-B36E-42CA-9526-DDC7ADA4406A@gmail.com>

next in thread | raw e-mail | index | archive | help

Hello,

I've been pointed out by our partner that we are sending TCP packets with FIN flag and no ACK set, which is triggering
alerts on their firewalls.
I've investigated, and it appears that some of our FreeBSD hosts are really sending such packets. (they are running some java applications)
I did "tcpdump -s0 -vni em1 '(tcp[tcpflags] & tcp-ack == 0) && (tcp[tcpflags] & tcp-fin != 0)'" to catch them.

Is this considered normal?
It seems at least Juniper considers this malicious traffic : http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig-security/id-72577.html





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54EF0399-B36E-42CA-9526-DDC7ADA4406A>