>Number: 190102 >Category: misc >Synopsis: net.inet.tcp.drop_synfin=1 no longer works on FreeBSD 10+ >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu May 22 11:50:01 UTC 2014 >Closed-Date: >Last-Modified: >Originator: Mark Felder >Release: 10.0-RELEASE >Organization: SupraNet Communications Inc. >Environment: FreeBSD wil.supranet.net 10.0-RELEASE-p3 FreeBSD 10.0-RELEASE-p3 #0: Tue May 13 18:31:10 UTC 2014 r...@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64
>Description: net.inet.tcp.drop_synfin=1 no longer works on FreeBSD 10+ >How-To-Repeat: Run this scan on identically configured FreeBSD 9 and FreeBSD 10 servers nmap -v -v --scanflags SYNFIN -P0 <target> FreeBSD 9 servers will report "filtered" which is correct. FreeBSD 10 servers will report "open", which means it is vulnerable to this attack to bypass the firewall. The firewall in use on these machines is pf. It is possible to block SYN/FIN on pf as well, but our standard deployment is the sysctl method. >Fix: >Release-Note: >Audit-Trail: >Unformatted: _______________________________________________ freebsd-bugs@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-bugs To unsubscribe, send any mail to "freebsd-bugs-unsubscr...@freebsd.org"