>Number: 190102
>Category: misc
>Synopsis: net.inet.tcp.drop_synfin=1 no longer works on FreeBSD 10+
>Confidential: no
>Severity: non-critical
>Priority: low
>Responsible: freebsd-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Thu May 22 11:50:01 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator: Mark Felder
>Release: 10.0-RELEASE
>Organization:
SupraNet Communications Inc.
>Environment:
FreeBSD wil.supranet.net 10.0-RELEASE-p3 FreeBSD 10.0-RELEASE-p3 #0: Tue May 13 18:31:10 UTC 2014 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64
>Description:
net.inet.tcp.drop_synfin=1 no longer works on FreeBSD 10+
>How-To-Repeat:
Run this scan on identically configured FreeBSD 9 and FreeBSD 10 servers
nmap -v -v --scanflags SYNFIN -P0 <target>
FreeBSD 9 servers will report "filtered" which is correct. FreeBSD 10 servers will report "open", which means it is vulnerable to this attack to bypass the firewall.
The firewall in use on these machines is pf. It is possible to block SYN/FIN on pf as well, but our standard deployment is the sysctl method.
>Fix:
>Release-Note:
>Audit-Trail:
>Unformatted:
_______________________________________________
freebsd-bugs@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-bugs
To unsubscribe, send any mail to "freebsd-bugs-unsubscribe@freebsd.org"