Re: [Full-Disclosure] IETF Draft - Fix for TCP vulnerability (fw

看板FB_security作者時間22年前 (2004/04/24 00:58), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串17/23 (看更多)
On Thu, 22 Apr 2004, jayanth wrote: > if i remember right this was done to handle the Alteons which > generate a RST segment that would fall within the window size but not the > next expected sequence no. > So they would do something crazy like rcv_nxt + rcv_win as the sequence no, > for the RST segment rather than rcv_nxt + 1. > This was part of the RFC though. > > If it is a problem we can always revert it back. > > jayanth What type of packet was causing the Alteons to emit the RST? SYN, FIN, normal data? Also, has Alteon fixed the problem or do their load balancers still exhibit the behavior? Mike "Silby" Silbersack _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #10YKit00 (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 17 之 23 篇):
文章代碼(AID): #10YKit00 (FB_security)