From owner-freebsd-stable Fri Jan 21 15:58:30 2000 Delivered-To: freebsd-stable@freebsd.org Received: from cairo.anu.edu.au (cairo.anu.edu.au [150.203.224.11]) by hub.freebsd.org (Postfix) with ESMTP id 0A2641582C; Fri, 21 Jan 2000 15:58:19 -0800 (PST) (envelope-from avalon@cairo.anu.edu.au) Received: (from avalon@localhost) by cairo.anu.edu.au (8.9.3/8.9.3) id KAA15748; Sat, 22 Jan 2000 10:58:28 +1100 (EST) From: Darren Reed Message-Id: <200001212358.KAA15748@cairo.anu.edu.au> Subject: Re: bugtraq posts: stream.c - new FreeBSD exploit? To: kraemer@u.washington.edu (Brian Kraemer) Date: Sat, 22 Jan 2000 10:58:28 +1100 (Australia/NSW) Cc: avalon@coombs.anu.edu.au (Darren Reed), freebsd-security@FreeBSD.ORG, freebsd-stable@FreeBSD.ORG In-Reply-To: from "Brian Kraemer" at Jan 21, 2000 08:55:32 AM X-Mailer: ELM [version 2.5 PL1] MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG In some mail from Brian Kraemer, sie said: > > On Fri, 21 Jan 2000, Darren Reed wrote: > > > btw, I think the better way to write the 3 rules is: > > > > block in quick proto tcp from any to any head 100 > > pass in quick proto tcp from any to any flags S keep state group 100 > > pass in all > > If I'm not mistaken, this ruleset (and no other rules) will also > effectively block any outgoing TCP sessions initiated from this machine. > The machine will send a SYN, and then get blocked because the input rules > never saw an incoming SYN to start keeping state. > > I assume a rule that keeps state on the outgoing would fix this? Yes. I forgot about that :-) pass out proto tcp from any to any flags S keep state would be required also. Darren To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message