Date: Thu, 20 Jan 2000 21:21:36 -0800 (PST) From: Matthew Dillon <dillon@apollo.backplane.com> To: Brett Glass <brett@lariat.org> Cc: Alfred Perlstein <bright@wintelcom.net>, security@FreeBSD.ORG Subject: Re: stream.c worst-case kernel paths Message-ID: <200001210521.VAA56412@apollo.backplane.com> References: <4.2.2.20000120182425.01886ec0@localhost> <20000120195257.G14030@fw.wintelcom.net> <4.2.2.20000120220649.018faa80@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
:How about one of the "golden" releases along 3.X-STABLE? After all, those :of us who are conservative will not be deploying 4.X in mission-critical :applications until the 4.1 or 4.2 point release (depending on how well :things go). : :I'd certainly like to see TCP_RESTRICT_RST on by default. Blocking RSTs :is getting to be a standard feature. Our lab's Windows boxes run BlackIce :Defender, which does this, and it makes them pretty resilient. : :And is there any reason NOT to turn on TCP_DROP_SYNFIN? : :--Brett I think it's a bad idea to make anything that breaks the protocol standard the default. I don't like the idea of always dropping (instead of sending an RST) - it's much better to band-limit the rate to deal with D.O.S. attacks and follow the protocol spec at all other times. For the same reason I don't particularly like the idea of killing SYN+FIN gratuitously. I couldn't care less whether nmap is able to identify my machine or not, but I care greatly about protocol breakage. -Matt Matthew Dillon <dillon@backplane.com> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001210521.VAA56412>