-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Jason Dixon wrote:
> On Wed, Mar 11, 2009 at 10:42:38AM -0400, Stuart VanZee wrote:
>> I understand that this might annoy a few of you, If it does
>> please accept my apologies.
>>
>> The place I work is required to have an external security scan
>> from time to time and the latest scan says that we have failed
>> because the firewall responded to a TCP packet that has the SYN
>> and FIN flags set.  I know that OpenBSD isn't vulnerable to the
>> exploits that use this:
>>
>> http://www.kb.cert.org/vuls/id/IAFY-5F8RWP
>>
>> However, I don't see any reason to respond to a packet with SYN
>> and FIN set, AND, a firewall rule that drops said TCP packets
>> would fix the fact that we are now "non compliant" as far as
>> the security scan goes.  I think a pf rule such as:
>>
>> block drop in quick proto tcp all flags SF/SF
>>
>> would do it.
>>
>> Does anyone see a way that this would come back to bite me on
>> the ass later?
> 
> S/SAFR
> 
> I just had to deal with this on our customer's PCI scan.  Don't argue
> with the logic, just do it.  :)

Let me guess -- TrustKeeper?  We just had to deal with this as well.
Submit an appeal and they should accept it.

The "flags S/SAFR" will work unless you are being a good little pf admin
and also scrubbing all the traffic.  The problem is pf considers SYN-RST
packets to be illegal and drops them (good) but only considers SYN-FIN
packets to be ambiguous and so it "normalizes" them and clears the FIN
bit (in this case for the PCI scan - bad) Then your server behind the
firewall received what it thinks is a nice clean SYN packet and it sends
back SYN-ACK.

- --
David Goldsmith
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJt+8i417vU8/9QfkRAqwwAJ43XDgeEn/1E4npP/YjexqBEMF5DgCfahVN
8LcIW4mqp4WryCmZ5EN1phQ=
=pYPL
-----END PGP SIGNATURE-----

Reply via email to