From owner-freebsd-security@freebsd.org Thu Dec 10 20:02:53 2020 Return-Path: Delivered-To: freebsd-security@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 66C274B4A6A; Thu, 10 Dec 2020 20:02:53 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (gate2.funkthat.com [208.87.223.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "gate2.funkthat.com", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CsPwX46Jcz4v0Y; Thu, 10 Dec 2020 20:02:52 +0000 (UTC) (envelope-from jmg@gold.funkthat.com) Received: from gold.funkthat.com (localhost [127.0.0.1]) by gold.funkthat.com (8.15.2/8.15.2) with ESMTPS id 0BAK2o6m054010 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 10 Dec 2020 12:02:51 -0800 (PST) (envelope-from jmg@gold.funkthat.com) Received: (from jmg@localhost) by gold.funkthat.com (8.15.2/8.15.2/Submit) id 0BAK2o93054009; Thu, 10 Dec 2020 12:02:50 -0800 (PST) (envelope-from jmg) Date: Thu, 10 Dec 2020 12:02:50 -0800 From: John-Mark Gurney To: "Hartmann, O." Cc: freebsd-security@freebsd.org, freebsd-current@freebsd.org Subject: Re: AMNESIA:33 and FreeBSD TCP/IP stack involvement Message-ID: <20201210200250.GJ31099@funkthat.com> Mail-Followup-To: "Hartmann, O." , freebsd-security@freebsd.org, freebsd-current@freebsd.org References: <20201209065849.47a51561@hermann.fritz.box> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="lc9FT7cWel8HagAv" Content-Disposition: inline In-Reply-To: <20201209065849.47a51561@hermann.fritz.box> X-Operating-System: FreeBSD 11.3-STABLE amd64 X-PGP-Fingerprint: D87A 235F FB71 1F3F 55B7 ED9B D5FF 5A51 C0AC 3D65 X-Files: The truth is out there X-URL: https://www.funkthat.com/ X-Resume: https://www.funkthat.com/~jmg/resume.html X-TipJar: bitcoin:13Qmb6AeTgQecazTWph4XasEsP7nGRbAPE X-to-the-FBI-CIA-and-NSA: HI! HOW YA DOIN? can i haz chizburger? User-Agent: Mutt/1.6.1 (2016-04-27) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (gold.funkthat.com [127.0.0.1]); Thu, 10 Dec 2020 12:02:51 -0800 (PST) X-Rspamd-Queue-Id: 4CsPwX46Jcz4v0Y X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of jmg@gold.funkthat.com has no SPF policy when checking 208.87.223.18) smtp.mailfrom=jmg@gold.funkthat.com X-Spamd-Result: default: False [-1.90 / 15.00]; RCVD_TLS_ALL(0.00)[]; ARC_NA(0.00)[]; FREEFALL_USER(0.00)[jmg]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,text/plain]; DMARC_NA(0.00)[funkthat.com]; RBL_DBL_DONT_QUERY_IPS(0.00)[208.87.223.18:from]; AUTH_NA(1.00)[]; SPAMHAUS_ZRD(0.00)[208.87.223.18:from:127.0.2.255]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM_SHORT(-1.00)[-1.000]; NEURAL_SPAM_LONG(1.00)[1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; SIGNED_PGP(-2.00)[]; FORGED_SENDER(0.30)[jmg@funkthat.com,jmg@gold.funkthat.com]; R_SPF_NA(0.00)[no SPF record]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; ASN(0.00)[asn:32354, ipnet:208.87.216.0/21, country:US]; FROM_NEQ_ENVFROM(0.00)[jmg@funkthat.com,jmg@gold.funkthat.com]; MAILMAN_DEST(0.00)[freebsd-security,freebsd-current]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Dec 2020 20:02:53 -0000 --lc9FT7cWel8HagAv Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hartmann, O. wrote this message on Wed, Dec 09, 2020 at 06:58 +0100: > I've got a question about recently discovered serious vulnerabilities > in certain TCP stack implementations, designated as AMNESIA:33 (as far > as I could follow the recently made announcements and statements, > please see, for instance, > https://www.zdnet.com/article/amnesia33-vulnerabilities-impact-millions-o= f-smart-and-industrial-devices/). >=20 > All mentioned open-source TCP stacks seem not to be related in any way > with freeBSD or any derivative of the FreeBSD project, but I do not > dare to make a statement about that. >=20 > My question is very simple and aimes towards calming down my employees > requests: is FreeBSD potentially vulnerable to this newly discovered > flaw (we use mainly 12.1-RELENG, 12.2-RELENG, 12-STABLE and 13-CURRENT, > latest incarnations, of course, should be least vulnerable ...). I'd be surprised if FreeBSD is vulnerable to those flaws, but I cannot make any official statement as there are too many to even start to investigate them. Also of note is that there were three other IP stacks that were NOT vulnerable to ANY new security issues in that report as well, so it isn't like the report found security vulnerability in every TCP/IP stack they tested. The best way to have confidence is to pay people to analyize and verify that the FreeBSD TCP/IP stack is secure, just as it is w/ any critical code that a company runs. --=20 John-Mark Gurney Voice: +1 415 225 5579 "All that I will do, has been done, All that I have, has not." --lc9FT7cWel8HagAv Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQJ8BAEBCgBmBQJf0n7pXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2MEI1RTRGMTNDNzYyMDZDNjEyMDBCNjAy MDVGMEIzM0REMDA2QURBAAoJECBfCzPdAGraZMgQALCbs+t2NLfROQq4sNHSsQRr OwzBmU+fKQI24SqfafaPDc8RuxIKP7luyjrFdK2DfSAMBn1A7YaM2YCHHifczfFX aBhHSdlzGThLme18Cd8ckAQuULEJ7afGN1twDCVQ/8OC6fKBSl9S3ehv5XYGeveB sMeb28qeCEWzd9sYpR9AV0B4FK3I+pVeeMiArtkpXwzXINsnuYL5EExZtbIWyz9V L0DB5oiMp4sOFbXxqbxzcVLm3teWDpG8tqpEmPy3RNFOatfr7KFujb70A7mk2Fqg 6fKvRR4oDtiKlysF8Ql75tQISPfsTnwpbTnzEzk9KSge4tP7vQg4lXWASkoOG58T N64FseVD4uFW6JN2mqRL+WInv28Rl5ohTe5ePLBuW/VivnNgwRNdqt4WhjArrq+Z 87G/7UVvz1pZ3UDtzLpqZSo2c3Um3Z/4T64pJOoxU9aUPOMtXt6e0Ml5t8tJO3bv YBz49/JcHezLPWxY7SQx8lpU70aUipD6UJfhHJHKa5qO7DPRzEkPITRh6xVmvOnx DlZQkb5nt0GCqSTPBwhMH/xg+Yuxt0fQevrss+F7Rzf8Ip0vki9hb/bk0nC4ztCJ 0hpmJBggIXSpcW6ie83AI05cnsSE6lAbjqQlUT8kPEWjoCJ/xAsfyW8x/5j1DLV3 2wxG/qrWycPy684OecVW =9Y7G -----END PGP SIGNATURE----- --lc9FT7cWel8HagAv--