Bugtraq mailing list archives
Re: denial of service attack possible
From: root () iifeak swan ac uk (System Administrator)
Date: Mon, 30 Oct 1995 20:14:01 +0000
The internet draft draft-heavens-problems-rsts-00.txt describes the problem in detail. In short, TCP doesn't handle RSTs correctly during the open and close negotiations of a connection.
Heaven's is something else. The fundamental problem is TCP requires a sequence space is not reused for 2 minutes (supposed worst case rtt). PAWS (RFC1331) extends this further by extending the effective sequence space, but still at the end of the day it comes up because you need infinite sequence space to never reuse an identifier. Heavens and also RFC1337 show cases where the protection in TCP is in adequate and you can get errors in data (in theory). Alan
Current thread:
- Re: denial of service attack possible Nathan Lawson (Oct 27)
- Re: denial of service attack possible Darren Reed (Oct 28)
- Re: denial of service attack possible Neil Readwin (Oct 30)
- <Possible follow-ups>
- Re: denial of service attack possible Casper Dik (Oct 29)
- Re: denial of service attack possible System Administrator (Oct 30)
- Re: denial of service attack possible John Stewart (Oct 31)
- Re: denial of service attack possible der Mouse (Nov 01)