Missing options in Grsec/Network Protections

Discuss usability issues, general maintenance, and general support issues for a grsecurity-enabled system.

Missing options in Grsec/Network Protections

Postby Clara_15 » Wed Apr 16, 2008 9:58 am

Hi,

I have patch kernel 2.6.24.4 with grsec 2.1.11 and options missing in "Network Protections" like:

- Truly random TCP ISN selection (rand_isns)
- Randomized IP IDs: (rand_ip_ids)
- Randomized TCP source ports: (rand_tcp_src_ports)
- Randomized RPC XIDs: (rand_rpc)
- Altered Ping IDs: (altered_pings)

As u can see on my screenshot: http://img255.imageshack.us/img255/6121/grsecte7.png
Thx! see u.
Clara_15
 
Posts: 3
Joined: Wed Apr 16, 2008 8:44 am

Re: Missing options in Grsec/Network Protections

Postby cormander » Wed Apr 16, 2008 10:46 am

I believe these were removed from the 2.1.11 version of grsecurity, I haven't seen them in quite a while.
cormander
 
Posts: 154
Joined: Tue Jan 29, 2008 12:51 pm

Re: Missing options in Grsec/Network Protections

Postby Clara_15 » Wed Apr 16, 2008 11:48 am

OK thx to you. :D

But, do you think theses options are enabled by default?

Because i was particulary interrested by this, for example, against TCP/IP fingerprint, idle host scanning etc...

See you! Clara.
Clara_15
 
Posts: 3
Joined: Wed Apr 16, 2008 8:44 am

Re: Missing options in Grsec/Network Protections

Postby spender » Thu Apr 17, 2008 7:34 pm

Altered ping IDs was removed because it provided no security benefit. For the others, the code present in more recent kernels is sufficient for security purposes.

-Brad
spender
 
Posts: 2185
Joined: Wed Feb 20, 2002 8:00 pm

Re: Missing options in Grsec/Network Protections

Postby Clara_15 » Thu Apr 17, 2008 8:04 pm

Hi spender,

Altered ping IDs was removed because it provided no security benefit.


OK, but u can use that for OS fingerprint.

For the others, the code present in more recent kernels is sufficient for security purposes.


IP ID can be use for idle host scanning, see http://nmap.org/idlescan.html

And u can do an OS FINGERPRINT witch TCP ISN, know OS use by remote machine and applications + versions, for example, and if your application is vulnerable u can use an exploit or and 0-day for exploitation...

Attaks begin by research of informations about your target, and i think its was good idea to obfuscated results, add a layer security protect.

What do u think about that ?
Clara_15
 
Posts: 3
Joined: Wed Apr 16, 2008 8:44 am


Return to grsecurity support