[OpenAFS] teardrop attack
David R Boldt
dboldt@usgs.gov
Thu, 8 Oct 2009 13:55:37 -0400
This is a multipart message in MIME format.
--=_alternative 00627A5E85257649_=
Content-Type: text/plain; charset="US-ASCII"
> I'm a bit puzzled. Quoting Wikipedia "A Teardrop attack involves
> sending mangled IP fragments with overlapping, over-sized payloads to
> the target machine." The goal is to trip bugs in the operating system's
> IP fragment re-assembly code that can cause the machine to crash.
>
> The vulnerable Windows versions are Windows 3.1, Windows 95, and NT4,
> and Linux kernels older than 2.0.32 and 2.1.63.
>
> Is the client machine configured to send jumbograms?
Trying to collect that information now, waiting on user response.
90% of our users are on Windows XP, 5% Mac.
This particular user would be unlikely to
customize settings.
> Is there some other reason that packets are being fragmented?
Don't know yet if this could be a factor but the user was
connecting through a Juniper VPN. Will dig deeper.
> Given that the machines that are vulnerable to the attack
> are so old, is there still a reason to turn on this protection
> in the firewall?
I was unaware of the target of teardrop attacks; It sounds like
an unnecessary filtering. Will make that pitch to the firewall
folks.
--david
--=_alternative 00627A5E85257649_=
Content-Type: text/html; charset="US-ASCII"
<br><tt><font size=2>> I'm a bit puzzled. Quoting Wikipedia "A
Teardrop attack involves<br>
> sending mangled IP fragments with overlapping, over-sized payloads
to<br>
> the target machine." The goal is to trip bugs in the operating
system's<br>
> IP fragment re-assembly code that can cause the machine to crash.<br>
> <br>
> The vulnerable Windows versions are Windows 3.1, Windows 95, and NT4,<br>
> and Linux kernels older than 2.0.32 and 2.1.63.<br>
> <br>
> Is the client machine configured to send jumbograms?<br>
</font></tt>
<br><tt><font size=2>Trying to collect that information now, waiting on
user response.</font></tt>
<br><tt><font size=2>90% of our users are on Windows XP, 5% Mac.</font></tt>
<br><tt><font size=2>This particular user would be unlikely to </font></tt>
<br><tt><font size=2>customize settings.</font></tt>
<br><tt><font size=2><br>
> Is there some other reason that packets are being fragmented?<br>
</font></tt>
<br><tt><font size=2>Don't know yet if this could be a factor but the user
was </font></tt>
<br><tt><font size=2>connecting through a Juniper VPN. Will dig deeper.</font></tt>
<br><tt><font size=2><br>
> Given that the machines that are vulnerable to the attack<br>
> are so old, is there still a reason to turn on this protection<br>
> in the firewall?<br>
</font></tt>
<br><tt><font size=2>I was unaware of the target of teardrop attacks; It
sounds like </font></tt>
<br><tt><font size=2>an unnecessary filtering. Will make that pitch
to the firewall</font></tt>
<br><tt><font size=2>folks.</font></tt>
<br>
<br>
<br><tt><font size=2>--david</font></tt>
--=_alternative 00627A5E85257649_=--