From owner-freebsd-security@FreeBSD.ORG Sat May 3 20:54:22 2014 Return-Path: Delivered-To: freebsd-security@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 5EECA610 for ; Sat, 3 May 2014 20:54:22 +0000 (UTC) Received: from fire.magemana.nl (magemana.nl [IPv6:2a01:7c8:aaae:25e::1]) by mx1.freebsd.org (Postfix) with ESMTP id 295F0150F for ; Sat, 3 May 2014 20:54:22 +0000 (UTC) Received: by fire.magemana.nl (Postfix, from userid 1003) id 107D04AB581; Sat, 3 May 2014 22:54:20 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by fire.magemana.nl (Postfix) with ESMTP id 0D0664AB4F4 for ; Sat, 3 May 2014 22:54:20 +0200 (CEST) Date: Sat, 3 May 2014 22:54:20 +0200 (CEST) From: Melvyn Sopacua To: freebsd-security@FreeBSD.org Subject: FreeBSD Security Advisory FreeBSD-SA-14:08.tcp Message-ID: User-Agent: Alpine 2.00 (BSF 1167 2008-08-23) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; format=flowed; charset=US-ASCII X-Mailman-Approved-At: Sat, 03 May 2014 21:46:36 +0000 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 03 May 2014 20:54:22 -0000 Hello, reading the forums, guided to PFsense forums and this: http://fxr.watson.org/fxr/source/netpfil/pf/pf_norm.c?v=FREEBSD10#L1889 Could someone confirm or deny that TCP fragment reassembly is actually implemented? -- Melvyn Sopacua