Date: Thu, 19 May 2005 13:27:10 -0700 From: Tim Traver <tt-list@simplenet.com> To: Ted Mittelstaedt <tedm@toybox.placo.com> Cc: bsd <freebsd-questions@freebsd.org> Subject: Re: PAWS security vulnerability Message-ID: <428CF69E.5050807@simplenet.com> In-Reply-To: <LOBBIFDAGNMAMLGJJCKNMEHPFBAA.tedm@toybox.placo.com> References: <LOBBIFDAGNMAMLGJJCKNMEHPFBAA.tedm@toybox.placo.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Ted, thanks for taking a look at this. I'm not sure I have the ability to test out your patch. Maybe someone else on this fine list can ? But this sounds like a pretty severe DOS issue that seems to be relatively simple to implement. Do you know if the 5.x branch is affected by this as well ? Tim. Ted Mittelstaedt wrote: >Hi Tim, > > Here is a slight mod of the OpenBSD patch for OpenBSD 3.6 that has been >rewritten for FreeBSD 4.11. YMMV If it works I would submit it to the >FreeBSD >security list. The only change I made is OpenBSD defines "tiflags" >FreeBSD defines >"thflags" I assume they are the same thing. The file is in >/usr/src/sys/netinet > >Turning off the timestamps would be a good way to make your network go >slow. > >*** tcp_input.c.original Thu May 19 11:52:30 2005 >--- tcp_input.c Thu May 19 12:00:14 2005 >*************** >*** 976,984 **** >--- 976,992 ---- > * record the timestamp. > * NOTE that the test is modified according to the latest > * proposal of the tcplw@cray.com list (Braden >1993/04/26). >+ * NOTE2 additional check added as a result of PAWS >vulnerability >+ * documented in Cisco security notice >cisco-sn-20050518-tcpts >+ * from OpenBSD patch for OpenBSD 3.6 015_tcp.patch > */ > if ((to.to_flags & TOF_TS) != 0 && > SEQ_LEQ(th->th_seq, tp->last_ack_sent)) { >+ if (SEQ_LEQ(tp->last_ack_sent, th->th_seq + tlen >+ >+ ((thflags & (TH_SYN|TH_FIN)) != 0))) >+ tp->ts_recent = to.to_tsval; >+ else >+ tp->ts_recent = 0; > tp->ts_recent_age = ticks; > tp->ts_recent = to.to_tsval; > } > >Ted > > > >>-----Original Message----- >>From: owner-freebsd-questions@freebsd.org >>[mailto:owner-freebsd-questions@freebsd.org]On Behalf Of Tim Traver >>Sent: Thursday, May 19, 2005 10:09 AM >>To: bsd >>Subject: PAWS security vulnerability >> >> >>Hi all, >> >>ok, this article was just published about a PAWS TCP DOS >>vulnerability, >>and lists freeBSD 4.x as affected. >> >>http://www.securityfocus.com/bid/13676/info/ >> >>Does anyone know how to turn the TCP timestamps off on FreeBSD 4.x ? >> >>and is 5.4 affected too ? >> >>Tim. >> >>_______________________________________________ >>freebsd-questions@freebsd.org mailing list >>http://lists.freebsd.org/mailman/listinfo/freebsd-questions >>To unsubscribe, send any mail to >>"freebsd-questions-unsubscribe@freebsd.org" >> >> >> > > >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?428CF69E.5050807>