Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 11 Nov 2006 22:18:03 +0100
From:      Dan Lukes <dan@obluda.cz>
To:        freebsd-security@freebsd.org
Subject:   Re: src/etc/rc.firewall simple ${fw_pass} tcp from any to any established
Message-ID:  <45563E0B.6010509@obluda.cz>
In-Reply-To: <159176.35953.qm@web30310.mail.mud.yahoo.com>
References:  <159176.35953.qm@web30310.mail.mud.yahoo.com>

next in thread | previous in thread | raw e-mail | index | archive | help
R. B. Riddick napsal/wrote, On 11/11/06 20:33:
>> 	Statefull rules can stop the sophisticated intruder, but are often more 
>> vulnerable to DoS attacks.

> Hmm... U mean, when someone creates a lot of states? 
> At least pf can limit that... 

	Yes.

	"Limit" mean - some packet (connections, states) are denied. The rest 
is question - is algorithm smart enough to limit attackers packet but no 
legitimate connections (or, at least, try to block attacker and try not 
to block legitimate connections). Especially against attacker with full 
knowledge of algorithm.

> But here it looks like just the good guys can create a state (from the
> good-network via the public network to the trusted web sites), so that states
> can't hurt, I think...

	Yes, in that case you are true.

					Dan



-- 
Dan Lukes                                   SISAL MFF UK
AKA: dan@obluda.cz, dan@freebsd.cz,dan@kolej.mff.cuni.cz



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?45563E0B.6010509>