2009/3/12 Stuart VanZee <[email protected]>:
>
> it doesn't seem possible to implement a rule that blocks
> these packets while still using packet normalization (scrub)
> since scrub is the first thing that sees a packet and drops
> the FIN on a packet that has SYN+FIN set (at least that is
> how I understand it).

Suppose you use an OpenBSD bridge (=extra hardware) in front of your
firewall, like so:

Internet <==> OpenBSD bridge <==> OpenBSD firewall <==> intranet

You could have scrubbing turned off at the bride and block the SYN+FIN
packets at the bridge. Then, at the firewall, you have scrubbing
turned on and get those cutey packets all squeaky clean.

Now instead of calculating the risk of being dropped by the Payment
Card industry like a hot potato against the risk of not scrubbing or
otherwise making technical compromises to placate them, you get to
make an entirely different calculation:

Weighing the cost of (and possible latency introduced by) one extra
box against the cost of the aforementioned shenanigans.

OTOH, if this affects you, then maybe you could also weigh the cost of
hiring a major OpenBSD developer to implement a new feature that could
make it possible to configure your pf.conf to exempt SYN+FIN packets
from scrubbing and/or deal with them separately against the cost of
the said above shenanigans.

Well, those are just my 2 eurocents.

regards,
--ropers

Reply via email to