[nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview

David Freedman david.freedman at uk.clara.net
Thu Oct 2 17:00:18 EDT 2008


I'm surprised nobody is sprouting this one at the moment:

http://tools.ietf.org/html/draft-ietf-tcpm-icmp-attacks-03

attacking ICMP is far more profitable since the communication is 
unidirectional, you don't have to guess TCP sequence numbers,
and you can tear down TCP with it.

Dave.

------------------------------------------------
David Freedman
Group Network Engineering 
Claranet Limited
http://www.clara.net



-----Original Message-----
From: nsp-security-bounces at puck.nether.net on behalf of Chris Morrow
Sent: Thu 10/2/2008 20:40
To: Florian Weimer
Cc: nsp-security at puck.nether.net
Subject: Re: [nsp-sec] Potential TCP / IP vulnerabilities announcedmidOctober - Outpost24 interview
 
----------- nsp-security Confidential --------



On Wed, 1 Oct 2008, Chris Morrow wrote:

>
>
> On Wed, 1 Oct 2008, Chris Morrow wrote:
>> I agree with Florian here, we need more data, this is all guesswork based 
>> on a horrid interview and article/blog-note.
>
> also, note that 'especially' does NOT have an "X" in it :(

someone (DaveW) posted this in the irc chat today:

<http://insecure.org/stf/tcp-dos-attack-explained.html>

that seems to cover the potentials brought up by outpost24, it also seems 
to make well in to the thoughts expressed here already...

-Chris
(this is another version of naptha as we were specualting)


_______________________________________________
nsp-security mailing list
nsp-security at puck.nether.net
https://puck.nether.net/mailman/listinfo/nsp-security

Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
community. Confidentiality is essential for effective Internet security counter-measures.
_______________________________________________




More information about the nsp-security mailing list