Re: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fw

看板FB_security作者時間22年前 (2004/04/21 22:46), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串3/23 (看更多)
On Tue, 20 Apr 2004, Don Lewis wrote: > I am concerned that step C will not solve the compatibility problem. The > FreeBSD host is sending a FIN to close an established connection, and > the peer host adding the window size advertised in the FIN packet to the > sequence number acknowledged in the FIN packet, and using the sum as the > sequence number for the RST packet, which puts the sequence number at > the end of the receive window. Would it be feasible for us to create a four to five element array to track "resettable" sequence numbers? This could hold the sequence numbers of the last few packets transmitted, and account for that edge case as well. I'm very uneasy with the IETF step C - sending more packets out into the network sounds like a new type of amplification attack. Mike "Silby" Silbersack _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #10Xeaz00 (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 3 之 23 篇):
文章代碼(AID): #10Xeaz00 (FB_security)