[32809] in bugtraq

home help back first fref pref prev next nref lref last post

RE: A new TCP/IP blind data injection technique?

daemon@ATHENA.MIT.EDU (David Gillett)
Thu Dec 11 13:56:39 2003

Reply-To: <gillettdavid@fhda.edu>
From: "David Gillett" <gillettdavid@fhda.edu>
To: "'Michal Zalewski'" <lcamtuf@ghettot.org>, <bugtraq@securityfocus.com>
Cc: <full-disclosure@netsys.com>
Date: Thu, 11 Dec 2003 08:38:00 -0800
Message-ID: <08cc01c3c005$2471c0b0$6e811299@HURON>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
In-Reply-To: <Pine.LNX.4.58.0312110022340.8651@nimue.bos.bindview.com>

> -----Original Message-----
> From: Michal Zalewski [mailto:lcamtuf@ghettot.org]
> 
<snip>
>   1. Path MTU discovery (DF set) prevents fragmentation [*]; some modern
>      systems (Linux) default to this mode - although PMTU discovery is
>      also known to cause problems in certain setups, so it is not always
>      the best way to stop the attack.
> 
>      [*] Also note that certain types of routers or tunnels tend to
>      ignore DF flag, possibly opening this vector again.
<snip> 
> Note that this has nothing to do with old firewall bypassing techniques
> and other tricks that used fragmentation to fool IDSes and so on -
> mandatory defragmentation of incoming traffic on perimeter devices will
> not solve the problem.

  I concluded some time back -- coming at it from an entirely different
angle from either of these -- that IP-layer fragmentation and reassembly 
was fatally flawed.  All sane implementations should set DF, and all but
the most secure of tunnels should honour it.

David Gillett



home help back first fref pref prev next nref lref last post