netdev
[Top] [All Lists]

Re: tcp vulnerability? haven't seen anything on it here...

To: hadi@xxxxxxxxxx
Subject: Re: tcp vulnerability? haven't seen anything on it here...
From: Florian Weimer <fw@xxxxxxxxxxxxx>
Date: Thu, 22 Apr 2004 15:58:40 +0200
Cc: Giuliano Pochini <pochini@xxxxxxxx>, "David S. Miller" <davem@xxxxxxxxxx>, linux-kernel@xxxxxxxxxxxxxxx, netdev@xxxxxxxxxxx, cfriesen@xxxxxxxxxxxxxxxxxx, Jörn Engel <joern@xxxxxxxxxxxxxxxxxxxx>
In-reply-to: <1082640135.1059.93.camel@jzny.localdomain> (hadi@cyberus.ca's message of "22 Apr 2004 09:22:16 -0400")
References: <XFMail.20040422102359.pochini@shiny.it> <1082640135.1059.93.camel@jzny.localdomain>
Sender: netdev-bounce@xxxxxxxxxxx
jamal <hadi@xxxxxxxxxx> writes:

> OTOH, long lived BGP sessions are affected assuming you are going across
> hostile path to your peer.

Hostile path is not required.  Not at all. 8-(

And it's not BGP specific.  You might be able to use this attack to
split IRC networks, too.  However, it's a bit harder in this case
because IRC servers usually use more random source ports.

-- 
Current mail filters: many dial-up/DSL/cable modem hosts, and the
following domains: atlas.cz, bigpond.com, postino.it, tiscali.co.uk,
tiscali.cz, tiscali.it, voila.fr.

<Prev in Thread] Current Thread [Next in Thread>