]> git.ipfire.org Git - ipfire-2.x.git/commit
sysctl.conf: drop RST packets for sockets in TIME-WAIT state
authorPeter Müller <peter.mueller@ipfire.org>
Wed, 30 Sep 2020 14:46:07 +0000 (14:46 +0000)
committerMichael Tremer <michael.tremer@ipfire.org>
Wed, 30 Sep 2020 17:14:07 +0000 (17:14 +0000)
commitdc5a89c948ec9c30352e44d19495e596758beabf
tree8172847e2859f042553dd5a91ef3798a77cb2b99
parenta839e63f74ddf0618846164dc6d0c4cdef014289
sysctl.conf: drop RST packets for sockets in TIME-WAIT state

RFC 1337 describes various TCP (side channel) attacks against
prematurely closed connections stalling in TIME-WAIT state, such as DoS
or injecting arbitrary TCP segments, and recommends to silently discard
RST packets for sockets in this state.

While applications still tied to such sockets should tolerate invalid
input (thanks to Jon Postel), there is little legitimate reason to send
such RST packets altogether.

At the time of writing, no collateral damage related to active RFC 1337
implementations is known. Measuerements in productive environments did
not reveal any side effects either, which is why I consider enabling RFC
1337 implementation to be a safe change.

See also: https://tools.ietf.org/html/rfc1337

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
config/etc/sysctl.conf