Re: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fw

看板FB_security作者時間22年前 (2004/04/22 15:32), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串10/23 (看更多)
On 21 Apr, Mike Silbersack wrote: > > On Wed, 21 Apr 2004, Don Lewis wrote: > >> > 1. Accept all RSTs meeting the criteria you just listed above. >> >> At this step, it would be better if we used the window size that was >> advertised it the last packet sent, since that is what the sequence >> number of the RST packet will be calculated from, while the window size >> could have increased if data was consumed from the receive queue between >> the time we sent the last packet and when we received the RST. >> >> It doesn't look like we keep the necessary data for this. Probably the >> easiest thing to do would be to calculate the expected sequence number >> in tcp_output() and stash it in the pcb. > > Do you have access to a system that exhibits the "RST at end of window" > syndrome so that you could code up and test out this part of the patch? Nope. The only report of this that I saw was from jayanth. Judging by the tcpdump timestamps, it looks like whatever this wierd piece of hardware was, it was nearby. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #10XtKJ00 (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 10 之 23 篇):
文章代碼(AID): #10XtKJ00 (FB_security)