[prev in list] [next in list] [prev in thread] [next in thread] 

List:       best-of-security
Subject:    Re: TCP Header Flags
From:       Julian Assange <proff () suburbia ! net>
Date:       1995-08-12 0:18:13
[Download RAW message or body]

Forwarded message:
>From firewalls-owner@GreatCircle.COM Sat Aug 12 09:00:04 1995
Date: Fri, 11 Aug 1995 18:04:41 -29900
From: Nick Simicich <njs@scifi.maid.com>
Subject: Re: TCP Header Flags
To: Carsten Schafer <carsten@group.com>
cc: firewalls@GreatCircle.COM, Carsten Schafer <carsten@group.com>
In-Reply-To: <9508111225.aa03131@rosie.software.group.com>
Message-ID: <Pine.3.89.9508111706.G9157-0100000@scifi.maid.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: firewalls-owner@GreatCircle.COM
Precedence: bulk

On Fri, 11 Aug 1995, Carsten Schafer wrote:

> I have recently been getting lots of packets with the SYN bit set
> and a combination of PUSH, URG and RST.  Our packet filter seems
> to throw away anything with a SYN bit set.  I guess I'm wondering
> which packets are considered connection requests by TCP when the packet
> contains a SYN bit.  Are packets containing the SYN flag and no others
> considered connection requests?  Most of the packets with the other flags
> set seem to be in response to HTTP requests.

The initial request for a TCP connection has the SYN bit set, but not the 
ACK bit.  Every other TCP packet in a connection has the ACK bit set, 
including the response to the initial SYN, which also has the SYN bit 
set.  

So filtration for directional TCP connections usually looks for packets that 
have SYN but not ACK.

Once sequence numbers are agreed on, SYN is no longer sent.

RST, of course, says that either we got a packet for a connection we don't
have a record of, or we don't have that socket at all (not 100% sure on
the latter, offhand - for UDP this returns ICMP Socket Unreachable). 

This means that you can typically probe the topology of a net protected 
by a packet filtering router even if they have filtered ICMP echo and 
port unreachable messages to stop ping and traceroute as well as all 
incoming connections.

By the way, this is quite likely attempts from the HTTPD at the other end 
to connect to your identd so that they can log userids in the http daemon 
logs.  Are the SYNs consistently aimed at the identd (or perhaps finger) 
ports?

Nick Simicich - njs@scifi.emi.net - (last choice) njs@bcrvm1.vnet.ibm.com
http://scifi.emi.net/njs.html -- Stop by and Light Up The World!

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic