misc/190102: net.inet.tcp.drop_synfin=1 no longer works on FreeBSD 10+

Mark Felder feld at FreeBSD.org
Thu May 22 11:50:01 UTC 2014


>Number:         190102
>Category:       misc
>Synopsis:       net.inet.tcp.drop_synfin=1 no longer works on FreeBSD 10+
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu May 22 11:50:01 UTC 2014
>Closed-Date:
>Last-Modified:
>Originator:     Mark Felder
>Release:        10.0-RELEASE
>Organization:
SupraNet Communications Inc.
>Environment:
FreeBSD wil.supranet.net 10.0-RELEASE-p3 FreeBSD 10.0-RELEASE-p3 #0: Tue May 13 18:31:10 UTC 2014     root at amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC  amd64

>Description:
net.inet.tcp.drop_synfin=1 no longer works on FreeBSD 10+


>How-To-Repeat:
Run this scan on identically configured FreeBSD 9 and FreeBSD 10 servers


nmap -v -v --scanflags SYNFIN -P0 <target>


FreeBSD 9 servers will report "filtered" which is correct. FreeBSD 10 servers will report "open", which means it is vulnerable to this attack to bypass the firewall.

The firewall in use on these machines is pf. It is possible to block SYN/FIN on pf as well, but our standard deployment is the sysctl method.
>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:


More information about the freebsd-bugs mailing list