[nsp-sec] Potential TCP / IP vulnerabilities announced midOctober - Outpost24 interview
Florian Weimer
fweimer at bfk.de
Wed Oct 1 03:18:24 EDT 2008
* Barry Raveendran Greene:
> I'm listening to this now. It looks like they are playing to client side
> cookies to get state to saturate. This one sounds new.
This would be something close the Naphta attack. I don't think you
need client-side cookies to end up with an effective attack. Naphta
simply discards the client state after sufficient state has
accumulated in the server (and prevents the client from sending RSTs).
I didn't list Naphta because mitigation seems possible possible at the
application level, without kernel API changes. For instance, at one
point, the Rock phishing proxy was relatively immune this type of
attack (much more than a default Apache configuration).
--
Florian Weimer <fweimer at bfk.de>
BFK edv-consulting GmbH http://www.bfk.de/
Kriegsstraße 100 tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99
More information about the nsp-security
mailing list