netdev
[Top] [All Lists]

Re: tcp vulnerability? haven't seen anything on it here...

To: hadi@xxxxxxxxxx
Subject: Re: tcp vulnerability? haven't seen anything on it here...
From: Florian Weimer <fw@xxxxxxxxxxxxx>
Date: Fri, 23 Apr 2004 15:55:33 +0200
Cc: Giuliano Pochini <pochini@xxxxxxxx>, "David S. Miller" <davem@xxxxxxxxxx>, linux-kernel@xxxxxxxxxxxxxxx, netdev@xxxxxxxxxxx, cfriesen@xxxxxxxxxxxxxxxxxx, Jörn Engel <joern@xxxxxxxxxxxxxxxxxxxx>
In-reply-to: <1082640135.1059.93.camel@jzny.localdomain> (hadi@cyberus.ca's message of "22 Apr 2004 09:22:16 -0400")
References: <XFMail.20040422102359.pochini@shiny.it> <1082640135.1059.93.camel@jzny.localdomain>
Sender: netdev-bounce@xxxxxxxxxxx
jamal <hadi@xxxxxxxxxx> writes:

> OTOH, long lived BGP sessions are affected assuming you are going across
> hostile path to your peer.

Jamal, please forget that "hostile path to your peer" part.  It's just
wrong.

You are entitled to your opinion that this isssue is being overhyped
(I tend to share it, at least until some evidence shows up that
there's also a 4.4BSD-like RST bug), but please try to understand the
issue before making any judgement.

-- 
Current mail filters: many dial-up/DSL/cable modem hosts, and the
following domains: atlas.cz, bigpond.com, postino.it, tiscali.co.uk,
tiscali.cz, tiscali.it, voila.fr.

<Prev in Thread] Current Thread [Next in Thread>