| To: | hadi@xxxxxxxxxx |
|---|---|
| Subject: | Re: tcp vulnerability? haven't seen anything on it here... |
| From: | Florian Weimer <fw@xxxxxxxxxxxxx> |
| Date: | Thu, 22 Apr 2004 15:58:40 +0200 |
| Cc: | Giuliano Pochini <pochini@xxxxxxxx>, "David S. Miller" <davem@xxxxxxxxxx>, linux-kernel@xxxxxxxxxxxxxxx, netdev@xxxxxxxxxxx, cfriesen@xxxxxxxxxxxxxxxxxx, Jörn Engel <joern@xxxxxxxxxxxxxxxxxxxx> |
| In-reply-to: | <1082640135.1059.93.camel@jzny.localdomain> (hadi@cyberus.ca's message of "22 Apr 2004 09:22:16 -0400") |
| References: | <XFMail.20040422102359.pochini@shiny.it> <1082640135.1059.93.camel@jzny.localdomain> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
jamal <hadi@xxxxxxxxxx> writes: > OTOH, long lived BGP sessions are affected assuming you are going across > hostile path to your peer. Hostile path is not required. Not at all. 8-( And it's not BGP specific. You might be able to use this attack to split IRC networks, too. However, it's a bit harder in this case because IRC servers usually use more random source ports. -- Current mail filters: many dial-up/DSL/cable modem hosts, and the following domains: atlas.cz, bigpond.com, postino.it, tiscali.co.uk, tiscali.cz, tiscali.it, voila.fr. |
| Previous by Date: | Re: tcp vulnerability? haven't seen anything on it here..., Giuliano Pochini |
|---|---|
| Next by Date: | Re: tcp vulnerability? haven't seen anything on it here..., Willy Tarreau |
| Previous by Thread: | Re: tcp vulnerability? haven't seen anything on it here..., Florian Weimer |
| Next by Thread: | Re: tcp vulnerability? haven't seen anything on it here..., Florian Weimer |
| Indexes: | [Date] [Thread] [Top] [All Lists] |