Page 1 of 1

SACK

Posted: Thu Jun 20, 2019 12:56 pm
by Imaging
Are the SACK panic related vulnerabilities an issue with ASL kernels? If not, which versions are immune? If so, when is an update expected?

Thanks!

Re: SACK

Posted: Thu Jun 20, 2019 4:33 pm
by mikeshinn
Only if TSO or GSO is enabled for the interface, and only if you have MSS protection disabled in ASL. Check this setting in ASL:

FW_MSS_DROP="yes"

ASL has always been immune to this kind of attack, for many many years if this is enabled.

If youre not using ASL, then you want to check to see if you have TSO or GSO enabled:

ethtool -k eth0 | egrep "tcp|gso|generic"

You can disable this with the same tool.

Or you can disable Selective ACK with this command:

echo 0 > /proc/sys/net/ipv4/tcp_sack

A new kernel will be available tomorrow should you wish to use TSO or GSO and dont want to use ASLs MSS protection (theres no reason not to use this protection).

Re: SACK

Posted: Tue Jun 25, 2019 3:56 pm
by Imaging
Mike:

Thanks for the explanation. From what I recall the MSS setting defaults to no on a fresh ASL install so many may not have it enabled. Perhaps it should default to yes moving forward?

Re: SACK

Posted: Wed Jun 26, 2019 5:55 pm
by mikeshinn
On older systems it was probably set to no, it is set to yes by default not sure when the change happened though but for sometime its been the default.

Re: SACK

Posted: Thu Jun 27, 2019 4:20 pm
by Imaging
Thanks. The wiki could use an update as it has:

=== FW_MSS_DROP ===

Note: This option is available in ASL 4.x and up.

This will detect and drop packets that have an invalid MSS.

Default: no

https://wiki.atomicorp.com/wiki/index.p ... W_MSS_DROP

versus

=== FW_MSS_DROP ===

Note: This option is available in ASL 4.x and up.

This will detect and drop packets that have an invalid MSS.

Default: yes

(for some odd reason can't update as my email isn't validating).

Re: SACK

Posted: Tue Jul 02, 2019 12:54 pm
by Imaging
What table in iptables is the mss rule added to? At present, after enabling, I'm not seeing a rule added (restarted the firewall, ran asl -s -f, rebooted the box etc., all the usuals JIC to make sure it was active).

Re: SACK

Posted: Fri Jul 05, 2019 2:50 pm
by mikeshinn
Its not added into a table, it changes kernel settings.

Re: SACK

Posted: Tue Jul 09, 2019 2:32 pm
by Imaging
Thank you. What would be the best way to test that all is protecting as it should?