Date: Sat, 22 Jan 2000 00:15:48 -0700 From: Wes Peters <wes@softweyr.com> To: Matthew Dillon <dillon@apollo.backplane.com> Cc: Brett Glass <brett@lariat.org>, Warner Losh <imp@village.org>, Darren Reed <avalon@coombs.anu.edu.au>, security@freebsd.org Subject: Re: stream.c worst-case kernel paths Message-ID: <38895924.5C358388@softweyr.com> References: <200001210417.PAA24853@cairo.anu.edu.au> <200001210642.XAA09108@harmony.village.org> <4.2.2.20000121163937.01a51dc0@localhost> <200001220035.QAA65392@apollo.backplane.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Matthew Dillon wrote:
>
> I wouldn't worry about multicast addresses for several reasons. First, very
> few machines actually run a multicast router. No router, no problem. Second,
> multicast tunnels tend to be bandwidth limited anyway. Third, from the point
> of view of victimizing someone multicast isn't going to get you very far
> because we already check for a multicast destination. We don't really need
> to check for a multicast source because it's really no different from a
> victimizing point of view as a non-multicast source address.
In my testing this morning, I was running stream against a FreeBSD 3.4-R
machine with two interfaces, one on a private net and one one our main
LAN. When I hit it with stream using random addresses, it was generating
multicast addresses. The target machine began flooding the ACKs onto the
main LAN, even though net.inet.ip.forwarding = 0.
Who needs a multicast router? I brought 400 machines to their knees and
completely flooded a frac T-1 from what was supposed to be an *isolated*
test network.
--
"Where am I, and what am I doing in this handbasket?"
Wes Peters Softweyr LLC
wes@softweyr.com http://softweyr.com/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?38895924.5C358388>
