Re: TCP 4 way handshake or TCP Split Handshake Attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Fatih USTA <fatihusta86@xxxxxxxxx> wrote:
> Hello,
> I am trying to protect my network from the tcp split handshake attack!
> (4-way handshake rejection or 3-way handshake enforcement).
> I tested the sample code. (link below) And passed the firewall(iptables).

Why wouldn't it?  Its valid tcp, your ruleset allows connections to happen
and there is a socket expecting a connection.

> I can't find any solution on the internet for Linux.

nft add rule filter forward tcp flags & (syn | ack) == syn ct direction reply counter drop

But why would you want to disallow this behaviour?

> Link1: https://tech.labs.oliverwyman.com/blog/2016/11/07/4-way-tcp-handshake-and-firewalls/

This is simultaneous connect, at least thats what can be seen in the
tcpdump, syns cross on wire, both ends send syn/ack.  WHy do you
consider this an "attack"?



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux