Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jan 2000 21:51:14 -0800 (PST)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        gdonl@tsc.tdk.com (Don Lewis)
Cc:        Giorgos Keramidas <charon@hades.hell.gr>, Brett Glass <brett@lariat.org>, Warner Losh <imp@village.org>, Darren Reed <avalon@coombs.anu.edu.au>, security@FreeBSD.ORG
Subject:   Re: stream.c worst-case kernel paths
Message-ID:  <200001220551.VAA67568@apollo.backplane.com>
References:   <200001220439.UAA15676@salsa.gv.tsc.tdk.com>

next in thread | previous in thread | raw e-mail | index | archive | help

:} :
:} :Do I forget something here?
:} :
:} :-- Giorgos
:} 
:}     That's pretty much it.  I've already sent a patch set to Warner for (b).
:}     I don't think we should do (a) or (c) until after the release, multicast
:}     isn't going to explode on us in the next 4 months.
:
:But that doesn't stop an attacker from sending forged TCP packets with
:forged multicast addresses.  Spraying the local network with a multicast
:response to an incoming unicast seems like a bad idea.

    No matter what you do there will always be something the attacker can 
    shoot at you.  The only thing you care about is making sure that it
    doesn't take down your servers.    Since multicast packets have to
    go through multicast routers to get anywhere, and those routers are
    already band-limited, a multicast attack is not likely to kill your
    network or your machine.  I doubt an attacker would be able to push
    enough mcast packets through the router to matter since if the ISP 
    is smart the bandwidth will be limited to something reasonable.  On
    the otherhand, non-multicast packets are almost *never* band limited.
    So guess what the IRC weenie is going to use!

    You can come up with scenarios all day long and turn the TCP stack into
    a programmers nightmare trying to 'fix' them and still not cover all your
    bases.  Because half this stuff doesn't make a damn bit of difference
    in survivability, I'm not particularly interested in seeing the TCP
    stack hacked to death with it.  Having things like TCP_RESTRICT_RST and
    TCP_DROP_SYNFIN in there is already bad enough - solving problems that
    have no real impact on anything (except someone's personal paranoia).

    It just isn't worth garbaging up the TCP stack with all of this junk.

					-Matt
					Matthew Dillon 
					<dillon@backplane.com>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001220551.VAA67568>