Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 28 Apr 2015 10:30:04 +0300
From:      Slawa Olhovchenkov <slw@zxy.spb.ru>
To:        "Ronald F. Guilmette" <rfg@tristatelogic.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: Logging TCP anomalies
Message-ID:  <20150428073004.GX1394@zxy.spb.ru>
In-Reply-To: <44814.1430172763@server1.tristatelogic.com>
References:  <A83FB715-936E-4A43-AE2D-E76C32D0F7DE@mac.com> <44814.1430172763@server1.tristatelogic.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On Mon, Apr 27, 2015 at 03:12:43PM -0700, Ronald F. Guilmette wrote:

> 
> In message <A83FB715-936E-4A43-AE2D-E76C32D0F7DE@mac.com>, 
> Charles Swiger <cswiger@mac.com> wrote:
> 
> >On Apr 27, 2015, at 11:37 AM, Ronald F. Guilmette <rfg@tristatelogic.com> wrot
> >e:
> ...
> >> and/or whether FreeBSD provides any options which,
> >> for example, might automagically trigger a close of the relevant TCP
> >> connection when and if such an event is detected.  (Connection close
> >> seems to me to be one possible mitigation strategy, even if it might
> >> be viewed as rather ham-fisted by some.)
> >
> >You need to be able to distinguish normal dup packets
> 
> Yes.
> 
> As I understand it, (verbatim) duplicate packets can sometimes arrive at
> an endpoint due simply to network anomalies.  However as I understand it,
> those will typically have identical lengths and payloads.  If I read that
> news article correctly, then the spoofed packets at issue will have the
> same sequence numbers as legit ones, but different lengths and/or payloads.

different lengths is legitime -- in case of sender resend-packets and
reduce packet sizes (for example from differen interface with
different MTU).




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150428073004.GX1394>