Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 24 Apr 2004 01:22:04 -0500 (CDT)
From:      Mike Silbersack <silby@silby.com>
To:        Don Lewis <truckman@FreeBSD.org>
Cc:        freebsd-security@FreeBSD.org
Subject:   Re: Proposed RST patch
Message-ID:  <20040424011603.F1915@odysseus.silby.com>
In-Reply-To: <200404240500.i3O5057E053032@gw.catspoiler.org>
References:  <200404240500.i3O5057E053032@gw.catspoiler.org>

next in thread | previous in thread | raw e-mail | index | archive | help


On Fri, 23 Apr 2004, Don Lewis wrote:

> > +				if (tp->last_ack_sent != th->th_seq) {
>
> I'd reverse the operand order here to match the operand order of the
> enclosing "if" block.  Other than that tiny nit, this looks fine.

Ok, I can do that.  I also plan to update the comments above.

> What is our status with regards to the spoofed SYN version of the
> attack?

I haven't checked yet.  I just finished up modifying the exploit so that
it uses icmp unreachables rather than TCP RSTs.  In addition to being a
good less in libnet, it helped prove that FreeBSD is already good wrt
unreach packets (due to work by jlemon and jayanth, IIRC), although I did
not test any other operating systems...  (Perhaps the draft should have
mentioned icmp unreach packets given that they may be handled similarly to
RSTs.)

SYNs are next on the list.

Mike "Silby" Silbersack


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040424011603.F1915>