diff options
author | Mike Frantzen <frantzen@cvs.openbsd.org> | 2004-05-05 23:16:04 +0000 |
---|---|---|
committer | Mike Frantzen <frantzen@cvs.openbsd.org> | 2004-05-05 23:16:04 +0000 |
commit | 03fe38624159eac6e41dc6a190b5b866f9b76748 (patch) | |
tree | 5b58d58675b482a463883b257b61556403829b2a /share/man | |
parent | 8f6a4f2e535871b3eafb365b6ebe1de3a4e5bc57 (diff) |
Use RFC1323 PAWS timestamps as a logical extension to the conventional TCP
sequence numbers by taking advantage of the maximum 1KHz clock as an upperbound
on the timestamp. Typically gains 10 to 18 bits of additional security against
blind data insertion attacks. More if the TS Echo wasn't optional :-(
Enabled with: scrub on !lo0 all reassemble tcp
ok dhartmei@. documentation help from jmc@
Diffstat (limited to 'share/man')
-rw-r--r-- | share/man/man5/pf.conf.5 | 20 |
1 files changed, 19 insertions, 1 deletions
diff --git a/share/man/man5/pf.conf.5 b/share/man/man5/pf.conf.5 index 22371b24b23..88ac0fc40e7 100644 --- a/share/man/man5/pf.conf.5 +++ b/share/man/man5/pf.conf.5 @@ -1,4 +1,4 @@ -.\" $OpenBSD: pf.conf.5,v 1.295 2004/04/24 23:22:54 cedric Exp $ +.\" $OpenBSD: pf.conf.5,v 1.296 2004/05/05 23:16:02 frantzen Exp $ .\" .\" Copyright (c) 2002, Daniel Hartmeier .\" All rights reserved. @@ -618,6 +618,24 @@ guessable base time. will cause .Ar scrub to modulate the TCP timestamps with a random number. +.It extended PAWS checks +There is a problem with TCP on long fat pipes, in that a packet might get +delayed for longer than it takes the connection to wrap its 32-bit sequence +space. +In such an occurance, the old packet would be indistinguishable from a +new packet and would be accepted as such. +The solution to this is called PAWS: Protection Against Wrapped Sequence +numbers. +It protects against it by making sure the timestamp on each packet does +not go backwards. +.Ar reassemble tcp +also makes sure the timestamp on the packet does not go forward more +than the RFC allows. +By doing this, +.Xr pf 4 +artificially extends the security of TCP sequence numbers by 10 to 18 +bits when the host uses appropriately randomized timestamps, since a +blind attacker would have to guess the timestamp as well. .El .El .Pp |