Doesn't CP _have_ to forward fragments?

Of course it does, which makes eitherbound inspection for long_icmp
false alarm in the following case:

An allowable ping comes in on IF0, which has MTU of say 1500, and on
its way out of IF1 (which has a smaller MTU, say 1492) any rule looking
for long_icmp will see the fragments follow bit high and take the action
specified (assuming rule 0's handling of ICMP doesn't take prescedence.)

I think FW1 will forward fragments.  I think it has to.  
And I think if this is wrong, one of the sharper minds on this list will
tell me.
cheers


> -----Original Message-----
> From: [EMAIL PROTECTED] [SMTP:[EMAIL PROTECTED]]
> Sent: Tuesday, May 23, 2000 8:07 AM
> To:   [EMAIL PROTECTED]
> Subject:      [FW1] IP Fragment Reassembly
> 
> 
> Recently Microsoft released a secuirty advisory for an announced IP
> Fragment Reassembly Vulnerability(00-029) .  I've attached it to this
> email.  I was looking to get feedback as to whether checkpoint firewall-1
> eliminates this flaw at the firewall level or not.  The security bulletin
> specifies:
> 
> Machines protected by a proxy  server or a firewall that drops fragmented
> packets would not be affected by this vulnerability. The machines most
> likely to  be affected by this vulnerability would be
> machines located on the edge of a network such as web servers or proxy
> servers.
> 
> I've read Lance's paper on Stateful Inspection and in a test environment
> have been unable to confirm that Checkpoint drops these packets.  Comments
> and suggestions as to the relative importance of this patch and whether it
> needs to be applied to machines behind a Checkpoint Firewall would be
> appreciated.
> 
> The following is a Security  Bulletin from the Microsoft Product Security
> Notification Service.
> 
> Please do not  reply to this message,  as it was sent  from an unattended
> mailbox.
>                     ********************************
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
> Microsoft Security Bulletin (MS00-029)
> - --------------------------------------
> 
> Patch Available for "IP Fragment Reassembly" Vulnerability
> 
> Originally Posted: May 19, 2000
> 
> Summary
> =======
> Microsoft has released a patch that eliminates a security
> vulnerability in Microsoft(r) Windows(r) 95, Windows 98, Windows
> NT(r) 4.0 and Windows 2000. The vulnerability could be used to cause
> an affected machine to temporarily stop performing  useful work.
> 
> Frequently asked questions regarding this vulnerability and
> the patch can be found at
> http://www.microsoft.com/technet/security/bulletin/fq00-029.asp
> 
> Issue
> =====
> The affected systems contain a flaw in the code that performs IP
> fragment reassembly. If a continuous stream of fragmented IP
> datagrams with a particular malformation were sent to an affected
> machine, it could be made to devote most or all of its CPU
> availability to processing them. The data rate needed to completely
> deny service varies depending on the machine and network  conditions,
> but in most cases even relatively moderate rates would suffice.
> 
> The vulnerability would not allow a malicious user to compromise data
> on the machine or usurp administrative control over it.  Although it
> has been reported that the attack in some cases will cause an affected
> machine to crash, affected machines in all  Microsoft testing returned
> to normal service shortly after the fragments stopped arriving.
> Machines protected by a proxy  server or a firewall that drops
> fragmented packets would not be affected by this vulnerability. The
> machines most likely to  be affected by this vulnerability would be
> machines located on the edge of a network such as web servers or proxy
> servers.
> 
> Affected Software Versions
> ==========================
>  - Microsoft Windows 95
>  - Microsoft Windows 98
>  - Microsoft Windows NT 4.0 Workstation
>  - Microsoft Windows NT 4.0 Server
>  - Microsoft Windows NT 4.0 Server, Enterprise Edition
>  - Microsoft Windows NT 4.0 Server, Terminal Server Edition
>  - Microsoft Windows 2000 Professional
>  - Microsoft Windows 2000 Server
>  - Microsoft Windows 2000 Advanced Server
> 
> Patch Availability
> ==================
>  - Windows 95:
>    http://download.microsoft.com/download/win95/update/8070/
>    w95/EN-US/259728USA5.EXE
>  - Windows 98:
>    http://download.microsoft.com/download/win98/update/8070/
>    w98/EN-US/259728USA8.EXE
>  - Windows NT 4.0 Workstation, Server and Server, Enterprise
>    Edition:
>    http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20829
>  - Windows NT 4.0 Server, Terminal Server Edition:
>    http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20830
>  - Windows 2000 Professional, Server and Advanced Server:
>    http://www.microsoft.com/Downloads/Release.asp?ReleaseID=20827
> 
> Note: Line breaks have been inserted into the URLs above for
> readability.
> 
> Note: Additional security patches are available at the Microsoft
> Download Center
> 
> More Information
> ================
> Please see the following references for more information related to
> this issue.
>  - Frequently Asked Questions: Microsoft Security Bulletin MS00-029,
>    http://www.microsoft.com/technet/security/bulletin/fq00-029.asp
>  - Microsoft Knowledge Base article Q259728 discusses this issue
>    and will be available soon.
>  - RFC 791, Internet Protocol,
>    http://www.ietf.org/rfc/rfc0791.txt?number=791
>  - Microsoft TechNet Security web site,
>    http://www.microsoft.com/technet/security/default.asp
> 
> Obtaining Support on this Issue
> ===============================
> This is a fully supported patch. Information on contacting Microsoft
> Technical Support is available at
> http://support.microsoft.com/support/contact/default.asp.
> 
> Acknowledgments
> ===============
> Microsoft thanks Bindview's RAZOR Security Team
> (http://www.bindview.com) for reporting this issue to us and working
> with us  to protect customers.
> 
> Revisions
> =========
>  - May 19, 2000: Bulletin Created.
> 
> - ----------------------------------------------------
> 
> THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
> "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT  DISCLAIMS ALL
> WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
> MERCHANTABILITY AND FITNESS FOR A PARTICULAR  PURPOSE. IN NO EVENT
> SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES
> WHATSOEVER INCLUDING DIRECT,  INDIRECT, INCIDENTAL, CONSEQUENTIAL,
> LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT
> CORPORATION OR ITS  SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF
> SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF
> LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
> LIMITATION MAY NOT APPLY.
> 
> Last updated May 19, 2000
> 
> (c) 2000 Microsoft Corporation. All rights reserved. Terms of use.
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: PGP 6.0.2
> 
> iQEVAwUBOSXSiI0ZSRQxA/UrAQEJxQf+Mkw36xigL/G2YKxP7G4BoBgt5HFGBvsL
> koWn2E3lgP9Xy1UnG24epLLjwW7w8lwasviSYBjMA5XOU3lqhTTWOTMjh5qY5/V0
> 8cnjeQOSUQxL4NO5c4nNLHkDBRlBeWNfEiFahb5+XOakaIwpiaBbS0WqI9ojY3Nh
> fsp4MBOcjFmcI0h9Mw4yPF62FeEyYubp5CojLk8cn2gPsJrSMMvtW9CX8lhNyTrB
> DqpUNhkwgddXk4hVuAFT37WJWcTp7mgtTeTtKH67z/NzXkkOHld25vOvZPtgl1Zn
> bAkcSU0CV4Af91flq0Uxp5s40DduVl1TY9l+mHosSClVyImS0ouOrQ==
> =wC2m
> -----END PGP SIGNATURE-----
> 
>    *******************************************************************
> You have received  this e-mail bulletin as a result  of your registration
> to  the   Microsoft  Product  Security  Notification   Service.  You  may
> unsubscribe from this e-mail notification  service at any time by sending
> an  e-mail  to  [EMAIL PROTECTED]
> The subject line and message body are not used in processing the request,
> and can be anything you like.
> 
> To verify the digital signature on this bulletin, please download our PGP
> key at http://www.microsoft.com/technet/security/notify.asp.
> 
> For  more  information on  the  Microsoft  Security Notification  Service
> please  visit  http://www.microsoft.com/technet/security/notify.asp.  For
> security-related information  about Microsoft products, please  visit the
> Microsoft Security Advisor web site at http://www.microsoft.com/security.
> 
> 
> 
> ==========================================================================
> ======
>      To unsubscribe from this mailing list, please see the instructions at
>                http://www.checkpoint.com/services/mailing.html
> ==========================================================================
> ======


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to