[nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
David Freedman
david.freedman at uk.clara.net
Thu Oct 2 17:00:18 EDT 2008
I'm surprised nobody is sprouting this one at the moment:
http://tools.ietf.org/html/draft-ietf-tcpm-icmp-attacks-03
attacking ICMP is far more profitable since the communication is
unidirectional, you don't have to guess TCP sequence numbers,
and you can tear down TCP with it.
Dave.
------------------------------------------------
David Freedman
Group Network Engineering
Claranet Limited
http://www.clara.net
-----Original Message-----
From: nsp-security-bounces at puck.nether.net on behalf of Chris Morrow
Sent: Thu 10/2/2008 20:40
To: Florian Weimer
Cc: nsp-security at puck.nether.net
Subject: Re: [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
----------- nsp-security Confidential --------
On Wed, 1 Oct 2008, Chris Morrow wrote:
>
>
> On Wed, 1 Oct 2008, Chris Morrow wrote:
>> I agree with Florian here, we need more data, this is all guesswork based
>> on a horrid interview and article/blog-note.
>
> also, note that 'especially' does NOT have an "X" in it :(
someone (DaveW) posted this in the irc chat today:
<http://insecure.org/stf/tcp-dos-attack-explained.html>
that seems to cover the potentials brought up by outpost24, it also seems
to make well in to the thoughts expressed here already...
-Chris
(this is another version of naptha as we were specualting)
_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security
Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
community. Confidentiality is essential for effective Internet security counter-measures.
_______________________________________________
More information about the nsp-security
mailing list