2008/10/2 Peter J. Philipp <[EMAIL PROTECTED]>:
>
> I listened to the podcast and got the idea that the socket is in ESTABLISHED
> state (so after 3 way handshake) and they
> mention that a packets PCB resources have timers, and that is what they
> exploit.  Perhaps you establish the session and
> send an HTTP request (pretend it's http) and never ACK the answer that gets
> repeated based on the internal timers.  It seemed to me they say that some
> stop repeating their content and just die.
> -p
>

I have just listened to the interview as well.

They said that they have looked at the source tree of Linux, at their
Timer code in the TCP stack. The Linux source code indeed have a
comment saying there are states that are bad and the Linux kernel
would try to avoid. So the sockstress program was written to work the
other way around, to try to get into that bad state as much as
possible, and it managed to bring down Linux systems.

They then run the same attack against a Windows machine, and it had
the same effect as well, so it really seem like a problem in the TCP
protocol.

In the article it is said that BSD are vulnerable as well, they didn't
mention if it was Free or Net or Open...

So I guess the question is if OpenBSD have such state in its TCP
stack, maybe a code auditing session (whenever it is done next, the
next Hackathon?) can look at something like that in the OpenBSD
kernel... or maybe the dev already saw this kind of problem and have
harden the TCP stack for OpenBSD?

-- 
This e-mail may be confidential. You may not copy, forward or use any
part. All disclaimers on the Internet are of zero legal effectiveness.
http://www.goldmark.org/jeff/stupid-disclaimers/

Reply via email to