Hi,

my default rule for unwanted tcp connections to my server is

   block return-rst in log proto tcp all

The vendor shipped version of ipfilter does not send back tcp resets but some strange fragments instead:

(snooping on the client)

client -> server TCP D=995 S=34357 Syn Seq=34853813 Len=0 Win=24820 Options=<nop,nop,sackOK,mss 1460>
server -> client       TCP IP fragment ID=34048 Offset=512  MF=0
client -> server TCP D=995 S=34357 Syn Seq=34853813 Len=0 Win=24820 Options=<nop,nop,sackOK,mss 1460>
server -> client       TCP IP fragment ID=34304 Offset=512  MF=0


Well, I would like to see something similar to this:

client -> server TCP D=995 S=34358 Syn Seq=670532660 Len=0 Win=24820 Options=<nop,nop,sackOK,mss 1460>
server -> client       TCP D=34358 S=995 Rst Ack=670532661 Win=0


Here is some additional information about the server system:

[EMAIL PROTECTED]:/etc/ipf# uname -a; /usr/sbin/ipf -V
SunOS server 5.10 Generic_118855-14 i86pc i386 i86pc
ipf: IP Filter: v4.0.3 (592)
Kernel: IP Filter: v4.0.3
Running: yes
Log Flags: 0 = none set
Default: pass all, Logging: available
Active list: 1


Any ideas?

Regards,
CB

--
Dr. Carsten Benecke, Regionales Rechenzentrum, Universität Hamburg,
Schlüterstr. 70, D-20146 Hamburg, Tel.: ++49 40 42838 3097,
Fax: ++49 40 42838 3096, mailto: [EMAIL PROTECTED]

Reply via email to