Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Jan 2000 22:39:03 -0800 (PST)
From:      Matthew Dillon <dillon@apollo.backplane.com>
To:        gdonl@tsc.tdk.com (Don Lewis)
Cc:        security@FreeBSD.ORG
Subject:   Re: stream.c worst-case kernel paths
Message-ID:  <200001220639.WAA68014@apollo.backplane.com>
References:   <200001220624.WAA15869@salsa.gv.tsc.tdk.com>

next in thread | previous in thread | raw e-mail | index | archive | help

:}     network or your machine.  I doubt an attacker would be able to push
:}     enough mcast packets through the router to matter since if the ISP 
:}     is smart the bandwidth will be limited to something reasonable.  On
:}     the otherhand, non-multicast packets are almost *never* band limited.
:}     So guess what the IRC weenie is going to use!
:
:But won't incoming packets with a multicast source address and non-multicast
:destination address be treated like non-multicast packets and escape
:the bandwidth limits?  I don't want my server to act as an amplifier
:that converts a high bandwidth stream of bogus unicast packets into
:a high bandwidth stream of multicast packets.
:
:Imagine what the IRC weenie could do if he could convert a stream of
:unicast packets to a multicast stream flood on your local network
:addressed to 224.0.0.5 (OSPF) which all the routers on your network
:are sniffing the wire for.

    But he can't.  We drop packets sent to multicast destinations and
    any RST responses back to multicast sources will be rate-limited.  OSPF
    has its own protocol, it will ignore any TCP garbage on its multicast
    address.

					-Matt
					Matthew Dillon 
					<dillon@backplane.com>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200001220639.WAA68014>