mailing list archives
Re: Security Advisory: A simple TCP spoofing attack
From: wietse () PORCUPINE ORG (Wietse Venema)
Date: Wed, 12 Feb 1997 12:44:53 -0500
Oliver Friedrichs of Secure Networks Inc. describes a semi-blind
IP address spoofing attack on servers that wipe IP options once a
connection has been established. This protection is used in network
daemons such as rshd and rlogind, and also in my own tcp wrapper.
I've updated the tcp wrapper source code. The wrapper now optionally
looks for IP source routing options and disconnects when it finds
such options. Those who care to look at my source code will notice
that recognizing IP options reliably is not entirely trivial.
Below is a little blurb with pointers to source code archives.
Version 7.5 of my TCP Wrapper program is available.
Version 7.5 has support for more UNIX system types, and gives better
protection against IP spoofing attacks based on source-routed TCP
connections, by refusing them. This protection is not enabled by
Version 7.5 does not introduce new features. Do not bother applying
this patch when you built your current tcp wrapper without enabling the
KILL_OPTIONS compiler switch. The patch is not useful for obsolete UNIX
versions that pre-date 4.4BSD, such as SunOS 4. Such systems are unable
to receive source-routed connections and are therefore not vulnerable
to IP spoofing attacks with source-routed TCP connections.
In order to upgrade, you can pick up the complete 7.5 source from the
usual FTP archives:
MD5 checksum: 8c7a17a12d9be746e0488f7f6bfa4abb
You can also send an email message to majordomo () wzv win tue nl with as
body (not subject):
get tcp-wrappers-announce Patch05
The full source code (Part01..07, Patch01..05) can be obtained in the
same manner. You can send multiple `get' commands in one message.
- HPSBUX9702-052 Security Vulnerability in the rlogin executable, (continued)