You are not logged in.

#1 2016-08-11 14:04:02

HappyClown
Member
Registered: 2015-08-15
Posts: 161

New TCP exploit effecting the Linux kernel of versions >3.6?

I was on a chat, when suddenly someone posted this https://thehackernews.com/2016/08/linux … cking.html. I don't know how authentic the article is, but everyone in the chat started freaking out. I'm not 100% certain if it's true, but I'd rather be safe than sorry. It's recommended that you modify sysctl.conf, which sounds fishy to me, as I don't see what sysctl has to do with TCP packets. Note that the majority of the users were running Debian.

Is this authentic and what should I do?

Offline

#2 2016-08-11 14:44:56

loqs
Member
Registered: 2014-03-06
Posts: 17,323

Re: New TCP exploit effecting the Linux kernel of versions >3.6?

See https://www.mail-archive.com/netdev@vge … 18677.html
Just changing the limit is not without issues itself from further in the thread https://www.mail-archive.com/netdev@vge … 18862.html

Online

#3 2016-08-11 15:20:01

ooo
Member
Registered: 2013-04-10
Posts: 1,638

Re: New TCP exploit effecting the Linux kernel of versions >3.6?

This is already included in 4.7 kernel. If you're paranoid you can upgrade yourself, or just wait until it hits [core].

HappyClown wrote:

It's recommended that you modify sysctl.conf, which sounds fishy to me, as I don't see what sysctl has to do with TCP packets.

Of course you can tweak your TCP settings with sysctl. It's all documented here: https://www.kernel.org/doc/Documentatio … sysctl.txt
Setting tcp_challenge_ack_limit to 1billion seems like a overkill though. The fix mentioned above sets it to 1000 with some randomization so that the actual value is anything between 500 and 1500 (if I understood the code correctly).

Offline

Board footer

Powered by FluxBB