Date: Thu, 20 Nov 1997 11:15:42 -0800 (PST) From: Matt Dillon <dillon@best.net> To: spork <spork@super-g.com> Cc: GNATS Management <gnats@FreeBSD.ORG>, freebsd-questions@FreeBSD.ORG Subject: Re: kern/5103: FreeBSD kernel lockup from spoofed TCP packet Message-ID: <199711201915.LAA28437@flea.best.net>
next in thread | raw e-mail | index | archive | help
This was my quick and dirty hack, but it's unverified whether it stops the attack. It should. -Matt : :This is a nasty one, care to share your hack-patch? : :Charles Sprickman :spork@super-g.com tick:/usr/src/sys/netinet# diff -c LINK/tcp_input.c tcp_input.c *** LINK/tcp_input.c Thu Oct 23 14:19:23 1997 --- tcp_input.c Thu Nov 20 03:38:59 1997 *************** *** 315,321 **** --- 315,329 ---- tcpstat.tcps_rcvbadsum++; goto drop; } + #endif /* TUBA_INCLUDE */ + /* + * Check that TCP port pair makes sense XXX MATT HACK + */ + if (ti->ti_src.s_addr == ti->ti_dst.s_addr && ti->ti_sport == ti->ti_dport) { + tcpstat.tcps_rcvshort++; /* actually error */ + goto drop; + } /* * Check that TCP offset makes sense,
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199711201915.LAA28437>