| To: | hadi@xxxxxxxxxx |
|---|---|
| Subject: | Re: tcp vulnerability? haven't seen anything on it here... |
| From: | Florian Weimer <fw@xxxxxxxxxxxxx> |
| Date: | Fri, 23 Apr 2004 15:55:33 +0200 |
| Cc: | Giuliano Pochini <pochini@xxxxxxxx>, "David S. Miller" <davem@xxxxxxxxxx>, linux-kernel@xxxxxxxxxxxxxxx, netdev@xxxxxxxxxxx, cfriesen@xxxxxxxxxxxxxxxxxx, Jörn Engel <joern@xxxxxxxxxxxxxxxxxxxx> |
| In-reply-to: | <1082640135.1059.93.camel@xxxxxxxxxxxxxxxx> (hadi@xxxxxxxxxx's message of "22 Apr 2004 09:22:16 -0400") |
| References: | <XFMail.20040422102359.pochini@xxxxxxxx> <1082640135.1059.93.camel@xxxxxxxxxxxxxxxx> |
| Sender: | netdev-bounce@xxxxxxxxxxx |
jamal <hadi@xxxxxxxxxx> writes: > OTOH, long lived BGP sessions are affected assuming you are going across > hostile path to your peer. Jamal, please forget that "hostile path to your peer" part. It's just wrong. You are entitled to your opinion that this isssue is being overhyped (I tend to share it, at least until some evidence shows up that there's also a 4.4BSD-like RST bug), but please try to understand the issue before making any judgement. -- Current mail filters: many dial-up/DSL/cable modem hosts, and the following domains: atlas.cz, bigpond.com, postino.it, tiscali.co.uk, tiscali.cz, tiscali.it, voila.fr. |
| Previous by Date: | Re: tcp vulnerability? haven't seen anything on it here..., jamal |
|---|---|
| Next by Date: | Re: tcp vulnerability? haven't seen anything on it here..., jamal |
| Previous by Thread: | Re: tcp vulnerability? haven't seen anything on it here..., Florian Weimer |
| Next by Thread: | Re: tcp vulnerability? haven't seen anything on it here..., alex |
| Indexes: | [Date] [Thread] [Top] [All Lists] |