I understand that this might annoy a few of you, If it does
please accept my apologies.

The place I work is required to have an external security scan
from time to time and the latest scan says that we have failed
because the firewall responded to a TCP packet that has the SYN
and FIN flags set.  I know that OpenBSD isn't vulnerable to the
exploits that use this:

http://www.kb.cert.org/vuls/id/IAFY-5F8RWP

However, I don't see any reason to respond to a packet with SYN
and FIN set, AND, a firewall rule that drops said TCP packets
would fix the fact that we are now "non compliant" as far as
the security scan goes.  I think a pf rule such as:

block drop in quick proto tcp all flags SF/SF

would do it.

Does anyone see a way that this would come back to bite me on
the ass later?

Stuart van Zee
[email protected]

Sage advise requested... fire retardant underwear in place...

Reply via email to