Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Protect Systems behind pfsense for SACK Panic - CVE-2019-11477?!

    Scheduled Pinned Locked Moved Firewalling
    14 Posts 5 Posters 1.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • KOMK
      KOM
      last edited by

      Block all ICMP traffic to your NATs would be a quick temporary fix.

      N 1 Reply Last reply Reply Quote 0
      • N
        neti @KOM
        last edited by

        @KOM ping ... oh nothing here ...?
        I ask for a filter.
        I dont want hide Servers....

        1 Reply Last reply Reply Quote 0
        • KOMK
          KOM
          last edited by

          iptables -I INPUT -p tcp -m tcpmss --mss 1:500 -j DROP

          No, you can't do that

          I dont want hide Servers....

          Blocking ICMP would only block ping so unless your users only ping your servers all day long, the servers would still be available

          1 Reply Last reply Reply Quote 0
          • RicoR
            Rico LAYER 8 Rebel Alliance
            last edited by

            AFAIK SACK has nothing to do with ICMP PING.
            If you have let's say a Webserver running on Port 80/443 it can be attacked via CVE-2019-11477 on those ports.

            -Rico

            1 Reply Last reply Reply Quote 0
            • N
              neti
              last edited by

              @neti said in Protect Systems behind pfsense for SACK Panic - CVE-2019-11477?!:

              With synproxy?! and pf scrubbing?

              My Question is how can i protect Servers behind the pfsense?
              Can i use synproxy to protect the Servers?
              Can i use pf scrubbing?

              I cannot find any filter option for min or max mss.

              jimpJ 1 Reply Last reply Reply Quote 0
              • KOMK
                KOM
                last edited by

                Sorry, I'm being dumb here. I got hung up on the moniker Ping of Death and thought it was a malformed ICMP packet issue. The CVEs aren't filled yet so there isn't a lot of detail there.

                Snort or Suricata may come out with an update to detect it. Otherwise, keep close watch on your distro's security announcements for the patch and apply it ASAP. It may already be available as I type this.

                N 1 Reply Last reply Reply Quote 0
                • N
                  neti @KOM
                  last edited by

                  short overview: https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md
                  more detail: https://access.redhat.com/security/vulnerabilities/tcpsack

                  1 Reply Last reply Reply Quote 1
                  • D
                    dalybrian
                    last edited by

                    Just sharing more details … not sure if or how this affects pfSense.

                    https://nakedsecurity.sophos.com/2019/06/19/netflix-researcher-spots-tcp-sack-flaws-in-linux-and-freebsd/

                    https://kb.cert.org/vuls/id/905115/

                    KOMK 1 Reply Last reply Reply Quote 0
                    • KOMK
                      KOM @dalybrian
                      last edited by

                      @dalybrian It's been said here, on twitter and on reddit. pfSense 2.4.4 is not affected by any of these at all.

                      1 Reply Last reply Reply Quote 0
                      • RicoR
                        Rico LAYER 8 Rebel Alliance
                        last edited by

                        https://forum.netgate.com/topic/144257/new-ping-based-attack/3

                        -Rico

                        KOMK 1 Reply Last reply Reply Quote 0
                        • KOMK
                          KOM @Rico
                          last edited by

                          @Rico Thank you. I was trying to find that post but couldn't remember where it was.

                          1 Reply Last reply Reply Quote 0
                          • jimpJ
                            jimp Rebel Alliance Developer Netgate @neti
                            last edited by

                            @neti said in Protect Systems behind pfsense for SACK Panic - CVE-2019-11477?!:

                            My Question is how can i protect Servers behind the pfsense?
                            Can i use synproxy to protect the Servers?
                            Can i use pf scrubbing?

                            I cannot find any filter option for min or max mss.

                            pf doesn't have an option to check the MSS explicitly. There is a scrub option to enforce a maximum MSS, but that's it. The scrub function doesn't check for a minimum MSS as far as I can see.

                            I'm not sure if synproxy would help you, it may introduce some other problems as well. Worth a try if you have an exploit test you can run against a vulnerable system.

                            Remember: Upvote with the 👍 button for any user/post you find to be helpful, informative, or deserving of recognition!

                            Need help fast? Netgate Global Support!

                            Do not Chat/PM for help!

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.