Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 25 Jul 2000 23:33:47 -0600
From:      Wes Peters <wes@softweyr.com>
To:        Tim Yardley <yardley@uiuc.edu>
Cc:        Don Lewis <Don.Lewis@tsc.tdk.com>, Maksimov Maksim <maksim@tts.tomsk.su>, freebsd-security@FreeBSD.ORG
Subject:   Re: How defend from stream2.c attack?
Message-ID:  <397E783B.ADB8162A@softweyr.com>
References:  <000401bfdb64$3eae8320$0c3214d4@dragonland.tts.tomsk.su> <000401bfdb64$3eae8320$0c3214d4@dragonland.tts.tomsk.su> <4.3.2.7.2.20000725181153.0218d700@students.uiuc.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
Tim Yardley wrote:
> 
> >I would recommend adding packet filter rules that block incoming packets
> >with IP broadcast addresses, both 255.255.255.255, and the broadcast
> >address(es) of your local network(s).
> 
> And block multicast if you arent using it in your lan.  Keep in mind that
> some switchs that are not multicast aware will treat the packets as
> broadcasts and create a storm.  Very bad.

With FreeBSD prior to 3.4/4.0 it didn't matter if you were attempting to
use multicast or not, a stream attack using random multicast source
addresses would turn your FreeBSD box into an attack reflector on every
attached interface.  Urk!

That no longer happens; the code now realizes that a TCP packet from a
multicast address is malformed and dumps it on the floor.

-- 
            "Where am I, and what am I doing in this handbasket?"

Wes Peters                                                         Softweyr LLC
wes@softweyr.com                                           http://softweyr.com/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?397E783B.ADB8162A>