Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 19 May 2005 13:27:10 -0700
From:      Tim Traver <tt-list@simplenet.com>
To:        Ted Mittelstaedt <tedm@toybox.placo.com>
Cc:        bsd <freebsd-questions@freebsd.org>
Subject:   Re: PAWS security vulnerability
Message-ID:  <428CF69E.5050807@simplenet.com>
In-Reply-To: <LOBBIFDAGNMAMLGJJCKNMEHPFBAA.tedm@toybox.placo.com>
References:  <LOBBIFDAGNMAMLGJJCKNMEHPFBAA.tedm@toybox.placo.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Ted,

thanks for taking a look at this. I'm not sure I have the ability to 
test out your patch. Maybe someone else on this fine list can ?

But this sounds like a pretty severe DOS issue that seems to be 
relatively simple to implement.

Do you know if the 5.x branch is affected by this as well ?

Tim.


Ted Mittelstaedt wrote:

>Hi Tim,
>
>  Here is a slight mod of the OpenBSD patch for OpenBSD 3.6 that has been
>rewritten for FreeBSD 4.11.  YMMV  If it works I would submit it to the
>FreeBSD
>security list.  The only change I made is OpenBSD defines "tiflags"
>FreeBSD defines
>"thflags" I assume they are the same thing.  The file is in
>/usr/src/sys/netinet
>
>Turning off the timestamps would be a good way to make your network go
>slow.
>
>*** tcp_input.c.original        Thu May 19 11:52:30 2005
>--- tcp_input.c Thu May 19 12:00:14 2005
>***************
>*** 976,984 ****
>--- 976,992 ----
>                 * record the timestamp.
>                 * NOTE that the test is modified according to the latest
>                 * proposal of the tcplw@cray.com list (Braden
>1993/04/26).
>+                * NOTE2 additional check added as a result of PAWS
>vulnerability
>+                * documented in Cisco security notice
>cisco-sn-20050518-tcpts
>+                * from OpenBSD patch for OpenBSD 3.6 015_tcp.patch
>                 */
>                if ((to.to_flags & TOF_TS) != 0 &&
>                    SEQ_LEQ(th->th_seq, tp->last_ack_sent)) {
>+                       if (SEQ_LEQ(tp->last_ack_sent, th->th_seq + tlen
>+
>+                               ((thflags & (TH_SYN|TH_FIN)) != 0)))
>+                                 tp->ts_recent = to.to_tsval;
>+                       else
>+                               tp->ts_recent = 0;
>                        tp->ts_recent_age = ticks;
>                        tp->ts_recent = to.to_tsval;
>                }
>
>Ted
>
>  
>
>>-----Original Message-----
>>From: owner-freebsd-questions@freebsd.org
>>[mailto:owner-freebsd-questions@freebsd.org]On Behalf Of Tim Traver
>>Sent: Thursday, May 19, 2005 10:09 AM
>>To: bsd
>>Subject: PAWS security vulnerability
>>
>>
>>Hi all,
>>
>>ok, this article was just published about a PAWS TCP DOS
>>vulnerability,
>>and lists freeBSD 4.x as affected.
>>
>>http://www.securityfocus.com/bid/13676/info/
>>
>>Does anyone know how to turn the TCP timestamps off on FreeBSD 4.x ?
>>
>>and is 5.4 affected too ?
>>
>>Tim.
>>
>>_______________________________________________
>>freebsd-questions@freebsd.org mailing list
>>http://lists.freebsd.org/mailman/listinfo/freebsd-questions
>>To unsubscribe, send any mail to
>>"freebsd-questions-unsubscribe@freebsd.org"
>>
>>    
>>
>
>  
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?428CF69E.5050807>