NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
kern/48674: ipfilter send TCP-reset packets for non-TCP packets with return-rst
>Number: 48674
>Category: kern
>Synopsis: ipfilter send TCP-reset packets for non-TCP packets with
>return-rst
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: kern-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Fri Mar 21 12:25:00 +0000 2014
>Originator: Dr. Wolfgang Stukenbrock
>Release: NetBSD 6.1
>Organization:
Dr. Nagler & Company GmbH
>Environment:
System: NetBSD test-s0 5.1.2 NetBSD 5.1.2 (NSW-WS) #3: Fri Dec 21 15:15:43 CET
2012 wgstuken@test-s0:/usr/src/sys/arch/amd64/compile/NSW-WS amd64
Architecture: x86_64
Machine: amd64
>Description:
The implementation of ipfilter will send TCP-reset packets for all
packet types, not only TCP.
So a rule like "block return-rst in quick on wm0 all head 1234" will
send a TCP-reset packet
for all packets not explicitly allowed in group 1234.
A "blocked" UDP packet will result in a TCP-reset packet send - this
does not make sence ...
>How-To-Repeat:
Setup a rule like above and send some packets that will be blocked. You
will see the TCP-reset answers.
>Fix:
There is a workaround for this problem:
Duplicate all head rules in the following way:
block return-rst in quick on wm0 proto tcp all head 1234
block in quick on wm0 all head 1234
This will suppress the TCP-reset packets, but it is ugly in the config
file.
To fix this issue, prior generating the reset packet a check for
incomming TCP should be added.
Sorry - no time to create a patch at the moment.
>Unformatted:
Home |
Main Index |
Thread Index |
Old Index