[OpenAFS] teardrop attack
Thu, 08 Oct 2009 14:07:02 -0400
David R Boldt wrote:
>> I'm a bit puzzled. Quoting Wikipedia "A Teardrop attack involves
>> sending mangled IP fragments with overlapping, over-sized payloads to
>> the target machine." The goal is to trip bugs in the operating system's
>> IP fragment re-assembly code that can cause the machine to crash.
>> The vulnerable Windows versions are Windows 3.1, Windows 95, and NT4,
>> and Linux kernels older than 2.0.32 and 2.1.63.
>> Is the client machine configured to send jumbograms?
> Trying to collect that information now, waiting on user response.
> 90% of our users are on Windows XP, 5% Mac.
> This particular user would be unlikely to
> customize settings.
Then jumbograms would be off.
>> Is there some other reason that packets are being fragmented?
> Don't know yet if this could be a factor but the user was
> connecting through a Juniper VPN. Will dig deeper.
IPSec VPNs often results in packet fragmentation unless the
RxMaxMTU is artificially restricted to a value less than 1272.