On Fri, 21 Jul 2006, Mike Frantzen wrote:

> Reassemble TCP does aggressive TCP PAWs checks on the TCP timestamps.
> It does the usual PAWs check to make sure a timestamp is not older than
> the last echoed value - which is in theory a wrapped sequence number.
> It also does its aggressive check to make sure the timestamp did not
> increase faster than the fastest clock which the RFC allows - an
> attacker can kill a connection by spoofing a higher timestamp.  In
> order to prevent blind TCP spoofing PF's scrub will require TCP
> timestamps on all data packets if the first data packet had a
> timestamp.  There are some transparent web caches out there that will
> allow the 3whs to complete (exchanging timestamp information) and then
> they will will hijack the TCP connection.  Of course the developers of
> the hijacking device took some liberal shortcuts that make them look
> just like a blind hijacker instead of a MITM hijacker.  If they hijack
> in the middle of the data stream (like after they see the HTTP request)
> and stop sending TCP Timestamps then PF's reassemble TCP will block
> further packets.

How does this interfere with the NAT code?

Reassemble tcp has _only_ problems from a machine behind the OpenBSD
NAT router. On the router itself or if using a proxy running on it,
there is no problem.

So I'd think that it is actually an OpenBSD bug in the NAT and/or
reassemble tcp code.

How can this be verified?

Regards, 
Walter

Reply via email to