From owner-freebsd-current Sat Jun 5 22: 6:35 1999 Delivered-To: freebsd-current@freebsd.org Received: from detlev.UUCP (tex-107.camalott.com [208.229.74.107]) by hub.freebsd.org (Postfix) with ESMTP id 97EF715003 for ; Sat, 5 Jun 1999 22:06:31 -0700 (PDT) (envelope-from joelh@gnu.org) Received: (from joelh@localhost) by detlev.UUCP (8.9.3/8.9.3) id AAA20353; Sun, 6 Jun 1999 00:06:20 -0500 (CDT) (envelope-from joelh) To: Scott Michel Cc: Garrett Wollman , freebsd-current@FreeBSD.ORG Subject: Re: net.inet.tcp.always_keepalive on as default ? References: <199906060127.SAA00862@mordred.cs.ucla.edu> From: Joel Ray Holveck Date: 06 Jun 1999 00:06:16 -0500 In-Reply-To: Scott Michel's message of "Sat, 05 Jun 1999 18:27:17 -0700" Message-ID: <86iu91dik6.fsf@detlev.UUCP> Lines: 48 X-Mailer: Gnus v5.5/Emacs 20.3 Sender: owner-freebsd-current@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG >> This wouldn't help the poor sod whose connection gets shot down every >> eight days while he's not there and doesn't know what hit him. > One thing that no one points out is that this "idle" connection > is potentially a security threat. Even if the physical connection > is iced and is reconnected later using the same IP and the TCP > connection is restored because it was kept alive, this presents a > whole new world of interesting exploits. It's non-trivial, but > that doesn't stop people like Network Associates' Labs from > publishing papers on the subject. Keepalives are not particularly useful against connection hijacking, as far as I can tell, except perhaps that a keepalive packet may disclose the current TCP sequence number to the new assignee of a dynamic IP. (This, of course, presents an argument for the opposite stance.) As near as I can tell, you're saying that if a transient outage is restored, then after it's restored, an idle connection may be used by an intruder. How does the transient outage affect this? If the transient outage has the side effect of changing routing, then an attacker (or somebody else) is moving cables around, or a dynamic link with a dynamic IP is being changed. In the former case, then the long delay between keepalive packets should not make them a valid protection. (If it takes an attacker more than a week to move a cable, then may I suggest your attacker needs to refine his technique.) In the latter case, then the attacker who now holds the destination IP can respond to the keepalive packets masquerading as the legitimate recipient as easily as they can do any other work involved in hijacking your connection. If the outage did not cause a reconfiguration, then the attacker generally has no different access to your network than before, and no more means to hijack an open connection than before. I've got some whiskey in me right now, so I may be unclear on what you're saying. Am I missing something here? Happy hacking, joelh -- Joel Ray Holveck - joelh@gnu.org Fourth law of programming: Anything that can go wrong wi sendmail: segmentation violation - core dumped To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message