Re: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fw

看板FB_security作者時間22年前 (2004/04/22 22:29), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串12/23 (看更多)
In some mail from Mike Silbersack, sie said: > On Wed, 21 Apr 2004, Don Lewis wrote: > > On 21 Apr, Mike Silbersack wrote: > > > Do you have access to a system that exhibits the "RST at end of window" > > > syndrome so that you could code up and test out this part of the patch? > > > > Nope. The only report of this that I saw was from jayanth. Judging by > > the tcpdump timestamps, it looks like whatever this wierd piece of > > hardware was, it was nearby. > > Something just occured to me... we can just lump the "RST at end of > window" case into the whole "RST somewhere in the window case". In that > way, we only need two cases: > > 1. RSTs exactly at last_ack_sent (always accepted) To pursue this thought further, if a FIN has been sent or received (connection has migrated from ESTABLISHED to CLOSE_WAIT or something else) then receiving an RST at this point should be much less of a problem, yes ? The only drawback is I've seen sessions where there's a last ditch attempt to get data through even though a FIN has been received. Darren _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #10XzQz00 (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 12 之 23 篇):
文章代碼(AID): #10XzQz00 (FB_security)