https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=287229

--- Comment #37 from Lucas Aubard <lucas.aub...@irisa.fr> ---
(In reply to Michael Tuexen from comment #33)
In the attacks we consider, the attacker does not try to reach FreeBSD limits
to force it to drop some fragments. Instead, the attacker sends a sequence of
overlapping packets that the NIDS and the supervised host reassemble
differently (e.g., the NIDS favors the oldest data in the overlapping portion
while the supervised host prefers the newest). Thus, the attacker does not try
to reproduce our entire set of test cases; they only need one of the test cases
to perform the attack.

In our testing, we are trying to obtain the FreeBSD reassembly policy, and the
limits are reached because of the VM setting and the testing parallelization. 

For your information, here are the results of some experiments I ran with 40 or
60 processes:
- (1) vm.kmem_size="200M", vm.kmem_size_max="200M", maxfragbucketsize=100,
maxfrags=400 (default), 40 processes => inconsistencies.
- (2) vm.kmem_size="200M", vm.kmem_size_max="200M", maxfragbucketsize=100,
maxfrags=4000, 40 processes => no inconsistency.
- (3) vm.kmem_size="200M", vm.kmem_size_max="200M", maxfragbucketsize=100,
maxfrags=4000, 60 processes => inconsistencies.
- (4) vm.kmem_size="1000M", vm.kmem_size_max="1000M", maxfragbucketsize=3
(default), maxfrags=1983 (default), 60 processes => inconsistencies.
- (5) vm.kmem_size="1000M", vm.kmem_size_max="1000M", maxfragbucketsize=3
(default), maxfrags=4000, 60 processes => no inconsistency.
- (6) vm.kmem_size="1000M", vm.kmem_size_max="1000M", maxfragbucketsize=100,
maxfrags=4000, 60 processes => inconsistencies.
Let me know if you want that I test other parameter values.
For my specific case, I should increase kmem_size to 2000M so as not to
experience reassembly inconsistency.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Reply via email to