[prev in list] [next in list] [prev in thread] [next in thread] 

List:       freebsd-hackers
Subject:    TCP connection initiation problem?
From:       Richard Jones <richard () a42 ! deep-thought ! org>
Date:       1997-09-29 12:16:17
[Download RAW message or body]

Could someone explain what lies behind the packet exchange shown below.
204.216.27.18 is FreeBSD's smtp port and port 8000 is a non-existent port 
on aaa.bbb.ccc.ddd (i.e. the initial packet from aaa.bbb.ccc.ddd to 
freebsd.org is forged).


20:42:56.116714 aaa.bbb.ccc.ddd.8000 > 204.216.27.18.25: S 667:667(0) win 4096 
(ttl 200, id 666)
20:42:56.686714 204.216.27.18.25 > aaa.bbb.ccc.ddd.8000: S 
856239105:856239105(0) ack 668 win 16384 <mss 1460> (DF) (ttl 53, id 16513)
20:42:56.686714 aaa.bbb.ccc.ddd.8000 > 204.216.27.18.25: R 668:668(0) win 0 
(ttl 255, id 5507)

Now at this point SunOS, Linux and NetBSD all take no for an answer,
but FreeBSD just won't quit.  It takes FreeBSD another 1min15secs to decide 
its SYN's are not wanted (i.e the connection establishment timers kicks in).
   It should be noted that the initial packet can have its source
faked and the packet exchange will occur between the FreeBSD host and
the unsuspecting other.

20:43:02.266714 204.216.27.18.25 > aaa.bbb.ccc.ddd.8000: S 
856239105:856239105(0) ack 668 win 16384 <mss 1460> (DF) (ttl 53, id 16672)
20:43:02.266714 aaa.bbb.ccc.ddd.8000 > 204.216.27.18.25: R 668:668(0) win 0 
(ttl 255, id 5508)
20:43:26.236714 204.216.27.18.25 > aaa.bbb.ccc.ddd.8000: S 
856239105:856239105(0) ack 668 win 16384 <mss 1460> (DF) (ttl 53, id 17083)
20:43:26.236714 aaa.bbb.ccc.ddd.8000 > 204.216.27.18.25: R 668:668(0) win 0 
(ttl 255, id 5509)

Ok, so in the next packet FreeBSD finally decides to give up:

20:44:11.236714 204.216.27.18.25 > aaa.bbb.ccc.ddd.8000: R 1:1(0) ack 1 win 
16384 (DF) (ttl 53, id 18235)


Note the RST's from aaa.bbb.ccc.ddd are not getting lost on the network,
I've verified on another host that these packets get through (the timings
really tell that story anyways).

Is this broken SYN-Flood protection? Does it allow Evil others to cause a 
large exchange of data between a FreeBSD host and any other at just the
cost of a single packet to Mrs/Mr Evil? Or am I completely missing the point?
Does this exchange have a use which is beyond my ken?

Richard Jones

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic