Quoting Simon Hobson (li...@thehobsons.co.uk):

> As Arnt Karlsen mentioned in the Bootloaders thread, there a new twist
> which is the result of a security fix
> 
> http://www.theregister.co.uk/2016/08/10/linux_tor_users_open_corrupted_communications/
> 
> In a bid to thwart the risk from injected packets carrying the right
> quintuplet of source and dest IPs, source & dest ports, and sequence
> numbers, it now seems that there are "occasional" challenge packets
> sent.  Simplifying a lot, basically one end will send packets to the
> other asking "did you really send that ?" - so if someone is spoofing
> fake traffic then it'll come to light.
> 
> As these packets are globally rate limited - a third party can send a
> flood of dodgy packets to cause this limit to be exceeded, and thus
> disable the protection it provides. As I read it, the attack doesn't
> really bring anything new other than the ability to disable the
> security offered by RFC 5961 - and thus lower the threshold to that of
> the original CVE from 2004.

I suspect the best interim solution is to set
/proc/sys/net/ipv4/tcp_challenge_ack_limit=999999999 via sysctl, until
something better-thought-out than RFC 5961 comes out.

-- 
Cheers,                  QA engineer walks into a bar.  Orders a beer.
Rick Moen                Orders 0 beers.  Orders 999999999 beers.  Orders
r...@linuxmafia.com      a lizard.  Orders -1 beers.  Orders a sfdeljknesv.
McQ! (4x80)              -- @sempf, https://www.sempf.net/post/On-Testing1.aspx
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to