[prev in list] [next in list] [prev in thread] [next in thread]
List: best-of-security
Subject: Sign bits in IP fragmentation
From: Julian Assange <proff () suburbia ! net>
Date: 1995-08-03 10:51:59
[Download RAW message or body]
Forwarded message:
>From firewalls-owner@GreatCircle.COM Tue Aug 1 10:09:06 1995
Message-Id: <199507311259.FAA28868@miles.greatcircle.com>
From: Darren Reed <avalon@coombs.anu.edu.au>
Subject: Misbehaving IP and firewalling.
To: Firewalls@GreatCircle.COM (Firewalls Mailing List)
Date: Mon, 31 Jul 1995 22:55:00 +1000 (EST)
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Content-Length: 887
Sender: firewalls-owner@GreatCircle.COM
Precedence: bulk
In RFC 791[1], it mentions that one of the "flags" (bit 0) next to the
fragmentation offset is reserved is and must be 0.
In some simple tests, I've found that:
* some IP firwall software assumes that the a fragment offset
value is amongst the bits in 0x9fff (the one's complement of
the "dont fragment" and "more fragments" fields)
* routers and unix hosts dont seem to care if it is 0 or not and
will pass them through.
...I'm not sure who to blame - they're both doing the wrong thing :-)
When is the next TCP/IP bakeoff ? Can we have a firwall (not proxy based)
bakeoff one too ? :-)
The danger here is that if it is set, 0x8000 is a non-zero fragment (as
the filter sees it) so obviously there is no port info, but your unix
box realises what is going on and turns it into 0x0000. Voila 8-)
Anyone ever see one of these packets ? :)
darren
[1] Section 3.1, page 13
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic