On Apr 27, 2015, at 11:37 AM, Ronald F. Guilmette <r...@tristatelogic.com> 
wrote:
> I am prompted to ask here whether or not FreeBSD performs any sort of
> logging of instances when "duplicate TCP packets but with different
> payloads" occurs,

Not normally.  Such things can be visible in netstat -s output as "completely
duplicate packets", "packets with some dup. data", etc and maybe enabling
network debugging sysctls would give more visibility.  They'd also generate
vast amounts of logging for normal network activity.

> and/or whether FreeBSD provides any options which,
> for example, might automagically trigger a close of the relevant TCP
> connection when and if such an event is detected.  (Connection close
> seems to me to be one possible mitigation strategy, even if it might
> be viewed as rather ham-fisted by some.)

You need to be able to distinguish normal dup packets or dropping connections
will break normal traffic.  For that matter, an attacker could try to spoof
legit connections and your countermeasure would presumably zap the legit
connection.

Use a firewall which tracks connection state, drops out-of-window packets,
forces fragmented packet reassembly to be performed, uses protocol-aware
proxies to validate the content of traffic where possible.

Regards,
-- 
-Chuck

_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to